This is the accessible text file for GAO report number GAO-12-60 
entitled 'Transportation Security: Actions Needed to Address 
Limitations in TSA's Transportation Worker Security Threat Assessments 
and Growing Workload' which was released on December 8, 2011. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as 
part of a longer term project to improve GAO products' accessibility. 
Every attempt has been made to maintain the structural and data 
integrity of the original printed product. Accessibility features, 
such as text descriptions of tables, consecutively numbered footnotes 
placed at the end of the file, and the text of agency comment letters, 
are provided but may not exactly duplicate the presentation or format 
of the printed version. The portable document format (PDF) file is an 
exact electronic replica of the printed version. We welcome your 
feedback. Please E-mail your comments regarding the contents or 
accessibility features of this document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

United States Government Accountability Office: 
GAO: 

Report to Congressional Committees: 

December 2011: 

Transportation Security: 

Actions Needed to Address Limitations in TSA's Transportation Worker 
Security Threat Assessments and Growing Workload: 

GAO-12-60: 

GAO Highlights: 

Highlights of GAO-12-60, a report to congressional committees. 

Why GAO Did This Study: 

Within the Department of Homeland Security (DHS), the Transportation 
Security Administration (TSA) manages several credentialing programs, 
which include background checking (known as Security Threat 
Assessments) and issuing credentials to transportation workers 
requiring unescorted access to the nation’s transportation facilities. 
The number of TSA programs and their potential for redundancy with 
state and local government programs has raised questions about these 
credentialing programs. In response to a mandate in the Coast Guard 
Authorization Act of 2010, GAO examined TSA credentialing programs to 
identify (1) the roles and responsibilities of federal and nonfederal 
government entities related to TSA’s transportation worker 
credentialing programs and how they compare, and (2) any key 
challenges TSA faced in ensuring the effectiveness of its 
credentialing programs. GAO reviewed program documentation, such as 
program processes, and conducted structured interviews with selected 
airports, port authorities, and state agencies. GAO selected 
nonfederal government entities based on volume of passengers, 
truckers, and cargo. 

What GAO Found: 

Nonfederal government entities have varying roles and responsibilities 
under three TSA transportation worker credentialing programs we 
reviewed—the Transportation Worker Identification Credential program 
(TWIC) for maritime workers; the Hazardous Materials Endorsement 
program (HME) for truckers seeking a commercial drivers license 
endorsement to carry hazardous materials; and the Aviation Workers 
program for airport workers. TSA administers the TWIC credentialing 
process, with no role for maritime port facility operators outside of 
verifying issued credentials. Under HME, state licensing agencies 
issue endorsements based on whether TSA reports favorable background 
checking results. In contrast, under the Aviation Workers program, TSA 
and airports share responsibility for the vetting process for airport 
workers, with airports responsible for enrolling applicants, 
adjudicating criminal history results TSA provides, and issuing, and 
if necessary, revoking airport badges. Eleven of 17 selected maritime 
ports—-including 4 of the top 10 largest ports-—reported implementing 
additional credentialing requirements to those under TSA regulations, 
which generally included requirements for applicants to obtain and 
present local port identification—in addition to a TWIC—to gain 
unescorted access. At three of these ports, local agencies conducted 
additional criminal history checks. In addition, 4 of 6 selected state 
licensing agencies responsible for issuing commercial drivers licenses 
were conducting additional criminal history checks on HME applicants. 
Some programs included applicant fees which added to the costs already 
incurred by applicants in obtaining TSA credentials. However, port 
officials reported their programs provided additional benefits over TSA’
s programs. The state and local credentialing programs we reviewed 
complemented the existing credentialing programs administered by TSA. 

TSA faces challenges in ensuring it has the necessary information and 
appropriate staffing to effectively conduct Security Threat 
Assessments for applicants to its transportation worker credentialing 
programs. First, in general, the level of access that TSA 
credentialing programs receive to Department of Justice (DOJ) Federal 
Bureau of Investigation (FBI) criminal history records is the level of 
access accorded for noncriminal justice purposes (e.g., equal to that 
of a private company doing an employment check on a new applicant, 
according to TSA) which limits TSA in accessing certain criminal 
history data related to charges and convictions. While TSA is seeking 
criminal justice type access to FBI systems, the FBI reports that it 
is legally unable to provide this access. The FBI and TSA are 
collaborating on options, but have not identified the extent to which 
a potential security risk may exist under the current process, and the 
costs and benefits of pursuing alternatives to provide additional 
access. Second, TSA officials reported the agency was not reviewing 
some state-provided criminal history for HME applicants because TSA 
did not have a mechanism to efficiently capture the data in its case 
system. Identifying a solution may help TSA better identify HME 
applicants posing security threats. Third, the TSA Adjudication Center 
relies on contractors for adjudicating applicant cases, and contractor 
turnover has affected the agency’s ability to meet its growing 
workload. Developing a workforce staffing plan that considers the 
costs and benefits of using contractors will help ensure that TSA 
meets its growing credentialing workload. 

What GAO Recommends: 

GAO recommends that (1) TSA and the FBI conduct a joint risk 
assessment of TSA’s access to criminal history records, (2) TSA assess 
costs and benefits of using state-provided criminal history 
information, and (3) TSA develop a workforce staffing plan to address 
its growing Adjudication Center workload. 

DHS and DOJ concurred with GAO’s recommendations. 

View [hyperlink, http://www.gao.gov/products/GAO-12-60] or key 
components. For more information, contact Stephen M. Lord at (202) 512-
4379 or lords@gao.gov. 
[End of section] 

Contents: 

Letter: 

Background: 

Stakeholder Roles and Responsibilities Vary under TSA Credentialing 
Programs, and Nonfederal Entities Have Implemented Additional 
Requirements: 

TSA Faces Data and Staffing Challenges in Ensuring Effectiveness of 
its Security Threat Assessments of Transportation Workers: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments and Our Evaluation: 

Appendix I: Objectives, Scope, and Methodology: 

Appendix II: TSA Credentialing Programs: 

Appendix III: TSA TWIC, HME, and Aviation Workers Programs: 
Legislative Background and Purpose: 

Appendix IV: Criminal Offenses That May Disqualify Applicants from 
Acquiring a TWIC or HME: 

Appendix V: Criminal Offenses That Disqualify Applicants under the 
Aviation Workers Program from Acquiring an Airport-Issued Access Badge: 

Appendix VI: Comments from the Department of Homeland Security: 

Appendix VII: GAO Contact and Staff Acknowledgments: 

Tables: 

Table 1: Selected Characteristics of the 11 Selected Maritime Ports 
with State or Local Credentialing Programs: 

Table 2: Four Selected States Conducting Criminal History Record 
Checks on HME Applicants: 

Table 3: TSA Credentialing Programs: 

Table 4: Legislative Background and Purpose of TSA's TWIC, HME, and 
Aviation Workers Programs: 

Figures: 

Figure 1: Comparison of TSA and Nonfederal Governing Entity Roles with 
Respect to the TWIC, HME, and Aviation Workers Programs: 

Figure 2: Average Monthly Program Enrollment and TTAC Adjudication 
Center Caseload for Reviewing Applicants with Potentially 
Disqualifying Information for TWIC, HME, and Aviation Workers 
Programs--July 2010 through June 2011: 

Abbreviations: 

ATSA: Aviation and Transportation Security Act: 

Compact Act: National Crime Prevention and Privacy Compact Act: 

DHS: Department of Homeland Security: 

DOJ: Department of Justice: 

DOT: Department of Transportation: 

FBI: Federal Bureau of Investigation: 

HME: Hazardous Materials Endorsement: 

MTSA: Maritime Transportation Security Act: 

NCIC: National Crime Information Center: 

SIDA: Security Identification Display Area: 

TSA: Transportation Security Administration: 

TTAC: Transportation Threat Assessment and Credentialing: 

TWIC: Transportation Worker Identification Credential: 

[End of section] 

United States Government Accountability Office: 
Washington, DC 20548: 

December 8, 2011: 

The Honorable John D. Rockefeller IV: 
Chairman: 
The Honorable Kay Bailey Hutchison: 
Ranking Member:
Committee on Commerce, Science, and Transportation: 
United States Senate: 

The Honorable Peter T. King: 
Chairman: 
The Honorable Bennie G. Thompson: 
Ranking Member: 
Committee on Homeland Security: 
House of Representatives: 

Securing transportation systems and facilities requires balancing 
security to address potential threats while facilitating the flow of 
people and goods that are critical to the U.S. economy and 
international commerce. Since 9/11, the Transportation Security 
Administration (TSA) within the Department of Homeland Security (DHS) 
has taken steps to ensure that transportation workers, particularly 
those that transport hazardous materials or have unescorted access to 
secure areas of federally regulated maritime or airport transportation 
facilities are properly screened to ensure they do not pose a security 
threat.[Footnote 1] These efforts are intended to reduce the 
probability of a successful terrorist or other criminal attack on the 
nation’s transportation systems, which include approximately 360 ports 
and more than 450 commercial airports. 

TSA reported administering 17 transportation security related 
credentialing programs covering a population of approximately 15 
million transportation workers such as those accessing airports and 
maritime ports, as well as truckers seeking a hazardous materials 
endorsement to a commercial driver’s license. These 17 TSA 
credentialing programs include conducting applicant background checks—
known as Security Threat Assessments—which are TSA reviews of 
applicant information and searches of government databases to 
determine if the applicant has known ties to terrorism and meets 
specified requirements such as those relating immigration status and 
criminal history.[Footnote 2] In addition, pursuant to federal law and 
corresponding regulations, TSA requires that airport and aircraft 
operators ensure that individuals undergo a fingerprint-based criminal 
history records check and terrorism and immigration checks, before 
receiving identification credentials that enable them unescorted 
access to SIDA or sterile areas of the airport.[Footnote 3] Most TSA 
credentialing programs are administered internally with no equivalent 
nonfederal government entity (namely states or port authorities) 
responsibilities under federal regulations.[Footnote 4] However, for 3 
of 17 TSA programs, nonfederal government entities have certain 
responsibilities under federal statutes and corresponding regulations, 
such as for enrolling applicants or issuing credentials to workers. 
These 3 programs are as follows: 

* TSA's Transportation Worker Identification Credential (TWIC) 
Program: A program requiring TSA to complete a Security Threat 
Assessment on individuals requiring unescorted access to secure or 
restricted areas of maritime facilities regulated under the Maritime 
Transportation Security Act (MTSA) of 2002[Footnote 5] and to issue a 
TSA biometric credential to qualified individuals.[Footnote 6] 

* TSA's Hazardous Materials Endorsement (HME) Threat Assessment 
Program: A program requiring TSA to conduct a Security Threat 
Assessment on truckers who apply for a Hazardous Materials Endorsement 
to a state commercial driver's license. 

* TSA's Aviation Workers Program: A program requiring TSA to complete 
a Security Threat Assessment and airport operators to complete a 
criminal history record check on individuals who apply for or are 
issued a credential for unescorted access to secure areas in U.S. 
domestic airports, including airport facility workers, retail 
employees, and airline employees. 

Federal statutes and corresponding regulations relating to the TWIC, 
HME, and Aviation Workers programs generally do not preempt nonfederal 
governing entities from implementing additional nonconflicting 
requirements. As a result, the number of credentialing programs in 
place by TSA, and the potential for their redundancy with nonfederal 
governing entity programs, has raised questions as to whether 
transportation workers may be subject to redundant background checks 
with different standards and additional costs. 

Section 817 of the Coast Guard Authorization Act of 2010[Footnote 7] 
mandated that we review background checks and forms of identification 
required under state and local transportation security programs and 
assess whether these programs duplicate or conflict with federal 
programs. The act also mandated that we make recommendations to the 
House Committee on Homeland Security and the Senate Committee on 
Commerce, Science, and Transportation on steps that can be taken to 
reduce or eliminate the duplication with federal programs. To fulfill 
this requirement, we addressed the following questions: 

* What are the roles and responsibilities of federal and nonfederal 
government entities related to certain TSA transportation worker 
credentialing-related programs and how do selected nonfederal 
governing entities' credentialing programs compare to TSA's programs? 

* What challenges, if any, does TSA face in ensuring the effectiveness 
of its credentialing-related programs? 

To identify which DHS credentialing programs for transportation 
workers have requirements for state and local governments, we analyzed 
relevant federal laws, including pertinent sections, as amended, of 
the Uniting and Strengthening America by Providing Appropriate Tools 
Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 
2001,[Footnote 8] the Aviation and Transportation Security Act, 
[Footnote 9] and MTSA, plus relevant DHS regulations that set out 
corresponding requirements for TSA and nonfederal governing entities 
with respect to conducting background checks and issuing 
identification to transportation workers. On the basis of this 
information, we focused our analysis on comparing nonfederal 
transportation worker credentialing programs with TSA's TWIC, HME, and 
Aviation Workers programs. Only the TWIC, HME, and Aviation Workers 
programs include nonfederal governing entity responsibilities with 
respect to TSA programs. 

To identify the roles and responsibilities of federal and nonfederal 
government entities related to certain TSA transportation security 
credentialing-related programs and how selected nonfederal governing 
entities' credentialing programs compare to TSA's programs, we 
examined TSA documentation on the TWIC Program, HME Program, and 
Aviation Workers Program. We also interviewed officials at TSA, the 
DHS Screening Coordination Office[Footnote 10], the Coast Guard, the 
Federal Bureau of Investigation (FBI), and the Department of 
Transportation (DOT) to discuss their role and nonfederal government 
entity roles in TSA transportation worker credentialing programs. We 
also interviewed officials from nine stakeholder organizations that 
represent the broad spectrum of nonfederal governing entity interests 
in TSA's programs, as well as officials from state and local governing 
agencies at selected maritime ports, airports, and state agencies to 
obtain their perspectives on TSA and nonfederal government roles and 
responsibilities.[Footnote 11] 

We collected information from maritime port authorities at 17 maritime 
port locations--including the top 10 ports by container volume in 
2010--plus 7 additional ports we identified as having credentialing 
programs. We visited officials at five locations (Baltimore, Maryland; 
Norfolk, Virginia; Miami and Port Everglades, Florida; and New York, 
New York), based on whether a state or local port authority had in 
place a credentialing program outside of TSA's TWIC program. We also 
collected information from eight category X[Footnote 12] airports--
this included 4 of the top 6 airports by passenger boardings in 2009 
plus four additional airports based on proximity to GAO offices. 
[Footnote 13] We conducted site visits to three of these eight 
airports (Seattle-Tacoma International Airport, Washington Dulles 
International Airport, and Baltimore-Washington International 
Airport). Further, we collected information on state requirements for 
issuing hazardous material endorsements to commercial driver's 
licenses from licensing agencies in six states, including the top five 
states as ranked by commercial drivers license issuance based on DOT 
data as of December 2010, plus one additional state that we identified 
as having additional state requirements.[Footnote 14] To determine how 
nonfederal governing entities' credentialing programs compare to TSA's 
programs, we analyzed pertinent federal laws and regulation which 
authorize the TWIC, HME, and Aviation Workers programs, such as MTSA 
and the USA PATRIOT Act, as well as TSA policy documents for 
implementing the programs, such as operational guidance and policies. 
By reviewing these laws, regulations, and policies, we identified 
requirements of TSA and select state and local governing agencies, as 
well as applicant eligibility standards such as lists of disqualifying 
criminal offenses and duration of time that agencies were required to 
consider these disqualifying criminal offenses ("look back period"). 
We then compared these standards and practices with those implemented 
under nonfederal governing agency (state or local) programs we 
identified. While the information we obtained from selected nonfederal 
governing entities cannot be generalized across all states and 
localities, it provided us with a perspective on how state and local 
government transportation worker programs compare with federal 
programs and requirements. 

To obtain information on challenges, if any, TSA faced in ensuring the 
effectiveness of its credentialing-related programs, we reviewed our 
reports, and analyzed pertinent laws and regulations related to TSA's 
use of criminal history record information, as well as TSA program 
documentation, including program training manuals, staffing 
information, and other documents detailing program processes and 
challenges TSA faced, for the TWIC, HME, and Aviation Workers 
credentialing programs. We also reviewed TSA data on the number of 
enrollments and adjudication caseload for TSA's TWIC, HME, and 
Aviation Workers programs--covering the period of July 2010 through 
June 2011. Through interviews with knowledgeable TSA officials we 
determined that these data were sufficiently reliable for our 
purposes. We interviewed headquarters officials from TSA's 
Transportation Threat Assessment and Credentialing (TTAC) program 
[Footnote 15], DHS' Screening Coordination Office, and the FBI's 
Criminal Justice Information Services Division, which maintains the 
FBI's national criminal history repository. Further, we reviewed cases 
from selected nonfederal governing entities of applicants whom 
entities had reported denying credentials, and the reasons they had 
done so. Additionally, we interviewed nonfederal agency stakeholders, 
including officials from two organizations representing state criminal 
justice repository agencies--the National Crime Prevention and Privacy 
Compact Council[Footnote 16] (Compact Council) and SEARCH.[Footnote 
17] We then evaluated TSA credentialing program processes against 
TSA's credentialing program mission needs and Standards for Internal 
Control in the Federal Government[Footnote 18] The information we 
obtained through our interviews with nonfederal government entities 
and stakeholder organizations are not generalizable, but provided 
valuable perspectives related to TSA's TWIC, HME, and Aviation Workers 
programs. Appendix I contains a more detailed discussion of our 
objectives, scope and methodology. 

We conducted this performance audit from February through November 
2011 in accordance with generally accepted government auditing 
standards. Those standards require that we plan and perform the audit 
to obtain sufficient, appropriate evidence to provide a reasonable 
basis for our findings and conclusions based on our audit objectives. 
We believe that the evidence obtained provides a reasonable basis for 
our findings and conclusions based on our audit objectives. 

Background: 

TSA Transportation Worker Credentialing Programs: 

TSA's credentialing programs are focused on identifying security 
threats posed by those individuals seeking to obtain an endorsement, 
credential, access and/or privilege (hereafter called a credential) 
for unescorted access to secure or restricted areas of transportation 
facilities at maritime ports and airports, or for transporting 
hazardous materials. TSA's 17 transportation security credentialing 
programs cover a population of approximately 15 million transportation 
workers in the maritime, surface, and aviation transportation modes. 
See appendix II for a table summarizing TSA credentialing programs. 

Most of the TSA credentialing programs are administered internally to 
TSA agencies with no equivalent nonfederal government entity 
responsibilities under federal regulations. In this way, there would 
not be potential for redundancy or duplication between DHS and 
nonfederal governing entity functions. Only the TWIC, HME, and 
Aviation Workers programs include nonfederal governing entity 
responsibilities with respect to TSA programs. Appendix III summarizes 
the legislative background and purpose of these three programs. 

As of June 2011, TSA reports that, collectively, the TWIC, HME, and 
Aviation Workers programs accounted for a population of approximately 
4.4 million workers--about 30 percent of the population TSA has vetted 
through its 17 credentialing-related programs. The criteria TSA uses 
in its Security Threat Assessments for TWIC and HME applicants vary 
from that of the Aviation Workers Program. For example, Security 
Threat Assessment criteria are aligned under both the HME and TWIC 
programs. These criteria include 24 disqualifying criminal offenses 
categorized into 10 "permanent disqualifying criminal offenses" and 14 
"interim disqualifying criminal offenses."[Footnote 19] Four of the 
permanent disqualifying criminal offenses, such as an act of terrorism 
and espionage, are not eligible for waiver.[Footnote 20] The other 20 
disqualifying criminal offenses (6 permanent and 14 interim) are 
eligible for waiver. Interim disqualifying criminal offenses are those 
specified offenses for which an individual has either been convicted, 
or found not guilty by reason of insanity during a 7-year period prior 
to the application, or for which an individual was released from 
incarceration during a 5-year period prior to the application. In 
contrast, under the Aviation Workers Program, there are 28 
disqualifying criminal offenses, but no permanent disqualifiers. 
[Footnote 21] More specifically, disqualifying criminal offenses under 
the Aviation Workers Program are those for which an individual has 
been convicted, or found not guilty by reason of insanity during the 
10 years prior to an application for airport identification. See 
appendix IV for a description of these disqualifying criminal offenses 
for the HME and TWIC programs and appendix V for these disqualifying 
criminal offenses for the Aviation Workers Program. 

TSA Credentialing-Related Processes: 

TSA's TTAC is responsible for administering Security Threat 
Assessments for transportation workers seeking to obtain a credential. 
[Footnote 22] This includes ensuring only eligible individuals are 
granted TSA-related credentials, such as a TWIC, or a TSA Security 
Threat Assessment approval for a nonfederal governing entity to issue 
an identification badge or endorsement, such as an HME on a Commercial 
Driver's License. While TSA's transportation worker credentialing- 
related programs include varying purposes, standards, or agency 
responsibilities, they generally include some or all of following 
process components: 

* Enrollment--Applicants pay an enrollment fee and submit biographic 
(name, address, etc.) and biometric information (photo and 
fingerprints) to TSA or nonfederal governing entity. 

* Background checking--Security Threat Assessment processes include 
reviewing information to determine if applicants are disqualified to 
possess a credential based on criminal offenses, immigration 
eligibility issues, links to terrorism, or mental capacity, all 
varying by program. Criminal history record checks, which are 
fingerprint-based, require an adjudicator to review the applicant's 
criminal history (referred to as a rap sheet) that occurred within a 
designated time frame (or look-back period) and compare this 
information against a set of disqualifying criminal offenses 
identified in statute and corresponding regulations in order to make a 
determination of eligibility. There are two levels of the Security 
Threat Assessment: 

- Initial automated vetting. The initial automated vetting process is 
conducted to determine whether any derogatory information is 
associated with the name and fingerprints submitted by an applicant 
during the enrollment process. This check is to be conducted against 
the FBI's criminal history records. These records contain information 
from federal, state and local sources in the FBI's National Crime 
Information Center (NCIC) database and the FBI's Integrated Automated 
Fingerprint Identification System/Interstate Identification Index, 
which maintain criminal records and related fingerprint submissions. 
[Footnote 23] The FBI's criminal history records check is a negative 
identification check, whereby the fingerprints are used to confirm 
that the associated individual is not identified as having a criminal 
record in the database. If an individual has a criminal record in the 
database, the FBI provides a criminal history rap sheet to TSA for 
adjudication. A check is also conducted against federal terrorist 
identity information from the Terrorist Screening Database, including 
the Selectee and No-Fly lists.[Footnote 24] To determine an 
applicant's immigration/citizenship status and eligibility, TSA also 
checks applicant information against the Systematic Alien Verification 
for Entitlements system.[Footnote 25] If the applicant is a U.S.-born 
citizen with no related derogatory information, the system can approve 
the individual's application for a credential with no further review 
of the applicant or human intervention. 

- TSA's TTAC Adjudication Center Review. A second-level review is 
conducted as part of an individual's background check if (1) the 
applicant has self-identified themselves to be a non-U.S. citizen or 
non-U.S. born citizen or national, or (2) the first-level review 
uncovers any derogatory information, such as a criminal offense. As 
such, not all applicants will be subjected to a second-level review. 
The second-level review consists of staff at TSA's Adjudication Center 
in Herndon, Virginia reviewing the applicant's enrollment file to 
determine if derogatory information may be potentially disqualifying. 

- Credential Issuance--involves the issuance of a physical card or 
endorsement. 

- Verification--refers to the responsibilities of the credential 
holder as well as the responsibilities of those entities which have 
regulatory responsibility for ensuring that only credentialed workers 
can perform certain functions or access secure or restricted areas of 
transportation facilities. This includes making a determination that 
the credential presented is authentic (not fraudulently developed); 
that the individual is the one to whom the document was issued (not an 
impostor), and remains valid (not revoked or expired). 

- Renewal--requires applicants to re-enroll, undergo a new Security 
Threat Assessment, and obtain a new credential. 

- Revocation--refers to the ability of the issuing entity to 
physically and/or electronically revoke a credential. Authority for 
revocation (such as TSA or a state or local government entity) varies 
pursuant to federal regulations for each credential program. 

Regulations Concerning Federal Preemption of State and Local 
Credentialing Requirements: 

In general, TSA credentialing regulations related to programs with 
state and local government involvement do not preempt state and local 
governments from implementing their own background checking or badging 
system requirements. For example, the TWIC final rule noted that TSA 
has asserted preemption in some areas "where federal regulations have 
historically dominated the field, such as merchant mariner 
regulations" but not with respect to state "background checks or 
badging systems in addition to the TWIC." According to the rule, 
states may be the proprietor of ports or port facilities, and as the 
proprietors they are is free to set standards determining who may 
enter their facilities, as does any other proprietor. The TWIC rule 
further provided that (1) states may have set standards for reasons 
other than guarding against the threat of terrorism, such as to combat 
drug smuggling or organized crime, and (2) as such, they are not 
regulating in the same areas that DHS is regulating. In addition, 
TSA's 2004 Interim Final Rule for the HME program recognized that the 
state is the licensing body for drivers who are state residents, and 
that the state has a clear mandate and interest in protecting the 
residents and drivers within its borders from dangerous drivers. As a 
result, TSA asserted that it did not wish to preclude additional state 
measures applied to drivers by the state as long as such measures are 
not inconsistent with the TSA rule. In this way, a state may conduct 
background checks using information from the state's criminal history 
repository and/or add additional disqualifying offenses.[Footnote 26] 
However, according to the TSA Interim Rule, a state would be preempted 
from applying a standard in which the federal interim disqualifying 
offenses are no longer treated as disqualifying. Similarly, airports 
have generally not been preempted from instituting additional 
background checks beyond those required by federal regulation and 
TSA's Aviation Workers Program, as part of their security plan and 
credentialing program. 

Stakeholder Roles and Responsibilities Vary under TSA Credentialing 
Programs, and Nonfederal Entities Have Implemented Additional 
Requirements: 

Stakeholders Have Varying Roles and Responsibilities in Credentialing: 

TSA conducts a Security Threat Assessment for those enrolled in its 
TWIC, HME, and Aviation Workers programs, but state and local 
governing entities' roles and responsibilities in these programs vary 
by program. For example, TSA is responsible for implementing the 
entire TWIC credentialing process including enrollment, background 
checks and credential issuance, with no role for maritime port 
facility operators--be they public port authority or privately 
operated facilities--outside of verifying credentials that have been 
issued. In contrast, under the Aviation Workers Program, TSA and 
airports and aircraft operators each have certain responsibilities for 
several elements of the credentialing process, including the criminal 
history record check. For example, airports and aircraft operators are 
responsible for ensuring the collection of application information, 
enrolling applicants and transmitting the results to TSA for the 
Security Threat Assessment. TSA's roles include TSA adjudicating the 
immigration and terrorism checks, running automated FBI criminal 
history records, and transmitting the results of the criminal history 
record checks to the airports and aircraft operators, which have a 
responsibility under TSA regulations for adjudicating the criminal 
history to identify potentially disqualifying criminal offenses 
specified under TSA regulations, and making a final determination of 
eligibility.[Footnote 27] Moreover, airport and aircraft operators 
issue their own local identification badges. 

Figure 1 summarizes the credentialing processes for the TWIC, HME, and 
Aviation Workers programs and the respective responsibilities of TSA, 
nonfederal governing entities, and private entities under these TSA 
programs. 

Figure 1: Comparison of TSA and Nonfederal Governing Entity Roles with 
Respect to the TWIC, HME, and Aviation Workers Programs: 

[Refer to PDF for image: illustrated table] 

Enrollment: 
TWIG: Applicant provides biographic and biometric information at one 
of 135 TSA enrollment centers; 
HME: Applicant provides biographic and biometric information to 
enrollment center or state. 12 states enroll and transmit applications 
directly to TSA, while at 39 others (including Washington, DC), 
applicants enroll at one of 220 TSA enrollment sites; 
Aviation workers: Applicant provides biographic and
biometric information to airport operator. Airport operator submits 
information to TSA. 

Background check: 
TWIG: TSA vets and adjudicates terrorist, immigration and criminal 
history information and makes determination of eligibility to 
applicant; 
HME: TSA vets and adjudicates terrorist, immigration, and criminal 
history information and provides determination of eligibility to state 
licensing agency and applicant; 
Aviation workers: TSA vets and adjudicates terrorist and immigration 
information, and provides results of criminal history checks to 
airport operator. Airport operator adjudicates criminal history and 
makes determination of eligibility. 

Issuance: 
TWIG: TSA issues TWIC to applicant; 
HME: State licensing agency issues HME to applicant; 
Aviation workers: Airport issues access badge to employee. 

Verification: 
TWIG: Port facilities responsible for reviewing TWIC and verifying  
business need to gain unescorted access to secure areas; 
HME: Employer to verify applicant information for those positions 
involving access to hazardous materials in accordance with
DOT required security plan. State authorities such as law enforcement 
conduct roadside inspections; 
Aviation workers: Airports responsible for implementing access control 
system as part of TSA-approved security plan. 

Renewal: 
TWIG: Every 5  years. New enrollment, criminal history and immigration  
checks, and new TWIC issued; 
HME: Every 5 years. New enrollment, criminal history and immigration 
checks, and HME issued. Some states may require more frequent renewal; 
Aviation workers: Airports must reissue badge every 2 years. TSA does 
not require further criminal history checks on applicants who are 
continuously employed. 

Revocation: 
TWIG: TSA can revoke TWIC based on updated criminal history and 
immigration information obtained at renewal or at any time based on 
recurring terrorist screening checks; 
HME: States can revoke HME for driving offenses, updated criminal 
history or immigration information obtained at renewal, TSA's 
recurrent terrorist screening checks, or for failing to pass knowledge 
exam; 
Aviation workers: Airport operators can revoke a badge if an 
individual is no longer employed by airport employer, for security 
violations of airport policy, or if airport is informed by TSA of 
derogatory information relating to immigration status or during 
recurring terrorist screening checks. 

Source: GAO analysis of DHS, DOT, and state information. Art Explosion 
(clipart). 

[End of figure] 

Nonfederal Governing Entities Have Additional Credentialing 
Requirements Compared to TWIC and HME: 

Maritime Port Programs: 

Port authorities or state agencies at 11 of the 17 maritime ports we 
contacted--including 4 of the top 10 largest maritime ports--had 
implemented additional credentialing requirements to those of the TWIC 
program.[Footnote 28] Of these 11 maritime ports, 10 required employer 
sponsorship in addition to a valid TWIC, 3 required applicants to 
undergo additional criminal history record checks, and 10 issued a 
local port identification credential in addition to the TWIC which was 
necessary for gaining unescorted access to secure areas of MTSA 
regulated port facilities. The following highlights key elements of 
these programs. 

* Enrollment. In addition to collecting biometric and/or biographic 
information from applicants, ports with additional programs required 
applicants to have a valid TWIC and generally required employer 
sponsorship as prerequisites for obtaining a local port credential. In 
general, sponsorship included requirements for applicants to provide 
documentation of port employment, such as a letter with an authorized 
employer signature, which the governing entity verifies. For example, 
at the port of Norfolk, the Virginia Port Authority requires all 
facility operators to register with local law enforcement, and once 
registered, these facilities are authorized to submit applications on 
behalf of employees who require access. In general, the programs had 
aligned their renewal requirements with those of the applicant's TWIC. 
For example, if an applicant has 3 of the 5 years of eligibility 
remaining on their TWIC, then the local credential would need to be 
renewed after 3 years. 

* Background Checks. At 3 of 11 ports that had additional 
requirements, governing entities were conducting additional criminal 
history record checks, while two others--the Port of Miami and Port 
Everglades--had discontinued conducting additional criminal history 
record checks in May 2011 in addition to the federal-level checks TSA 
used as part of its Security Threat Assessment for TWIC.[Footnote 29] 
First, whereas TSA's criminal history record check is conducted based 
on searches of the FBI's national databases, the governing entities 
for these three ports conduct both state and FBI criminal history 
record checks.[Footnote 30] State repositories are considered more 
comprehensive sources of state criminal history than that maintained 
by FBI databases. Second, one port governing agency considered 
additional disqualifying criminal offenses beyond those stipulated in 
TSA regulations that may disqualify applicants from acquiring the 
local port identification. For example, the Waterfront Commission of 
New York Harbor was screening applicants against additional 
disqualifying offenses, including theft and burglary, as did the two 
Florida ports prior to the repeal of Florida's state criminal history 
record check requirement for seaport employees. 

* Issuance. We found the types of credential issued under local 
programs had similar characteristics, with some ports reporting plans 
to change or eliminate their physical credentials as part of a future 
TWIC reader system deployment. For example, 10 of 11 ports with 
additional credentialing programs had requirements in place for an 
individual to obtain and present a second, locally issued port 
identification for unescorted access to port facilities--in addition 
to a TWIC. Of these, 9 ports reported using machine-readable 
credentials as part of their access control systems.[Footnote 31] For 
example, at the Port of Wilmington, North Carolina, the North Carolina 
State Port Authority issues a local identification access card which 
is a machine-readable card with a smart chip that contains some 
personal information, such as a name and picture. In addition to 
verifying that a cardholder's identification is valid for access to 
secure or restricted areas of the port facility, some entities had 
designed their systems to provide access control capabilities within 
the port facility so that only those populations of workers authorized 
to enter certain facilities within the port were able to do so. Unlike 
TWICs that cannot be customized by port facilities, some port-specific 
cards were color coded to signify areas which cardholders were 
authorized to access. 

* Six of 11 port authorities reported plans to revise or do away with 
their credentialing programs once the Coast Guard issues its final 
reader rule for the TWIC program and the ports deploy readers for 
electronically verifying TWICs.[Footnote 32] For example, in 2011, the 
South Carolina Port Authority reported it was planning to eliminate 
its physical identification card for the Port of Charleston and adopt 
a program whereby the port's central database ties worker enrollment 
information with individuals' TWIC information. Under this system, the 
port authority will upload permission to different access points which 
will be read by card readers and will verify whether a TWIC is active. 
[Footnote 33] 

* Table 1 summarizes the key aspects of the 11 ports with additional 
credentialing requirements. 

Table 1: Selected Characteristics of the 11 Selected Maritime Ports 
with State or Local Credentialing Programs: 

Port with state or local government program[A,B]: Alabama State Port 
Authority (Mobile); 
State criminal history record check: yes; 
Applicant fee: $25; 
Local port credential issued: yes. 

Port with state or local government program[A,B]: Port Everglades[C]; 
State criminal history record check: none (authorizing law repealed 
May 2011); 
Applicant fee: none[D]; 
Local port credential issued: yes. 

Port with state or local government program[A,B]: Georgia State Port 
Authority (Port of Savannah); 
State criminal history record check: none; 
Applicant fee: none; 
Local port credential issued: yes. 

Port with state or local government program[A,B]: Maryland Port 
Administration (Port of Baltimore); 
State criminal history record check: none; 
Applicant fee: none; 
Local port credential issued: yes. 

Port with state or local government program[A,B]: Massachusetts Port 
Authority; 
(Port of Boston); 
State criminal history record check: none; 
Applicant fee: none; 
Local port credential issued: yes. 

Port with state or local government program[A,B]: Port of Miami[C]; 
State criminal history record check: none (authorizing law repealed 
May 2011); 
Applicant fee: none; 
Local port credential issued: yes. 

Port with state or local government program[A,B]: Port of New York/New 
Jersey[E]; 
State criminal history record check: yes; 
Applicant fee: $25 for truck driver credential, $66.30 to $94.20 for 
longshoreman background check[F]; 
Local port credential issued: yes. 

Port with state or local government program[A,B]: North Carolina State 
Ports Authority (Port of Wilmington, Morehead City); 
State criminal history record check: yes; 
Applicant fee: $20; 
Local port credential issued: yes. 

Port with state or local government program[A,B]: Port of Portland 
(Oregon); 
State criminal history record check: none; 
Applicant fee: none; 
Local port credential issued: yes. 

Port with state or local government program[A,B]: South Carolina State 
Ports Authority (Charleston)[G]; 
State criminal history record check: none; 
Applicant fee: none; 
Local port credential issued: no. 

Port with state or local government program[A,B]: Virginia Port 
Authority (Norfolk, Newport News, Portsmouth); 
State criminal history record check: none; 
Applicant fee: none; 
Local port credential issued: yes. 

Source: GAO analysis of selected maritime port credentialing program 
information. 

[A] As reported between April and November 2011. 

[B] Covered populations include longshoremen, truck drivers, and other 
workers including contractors, vendors, shipping personnel, and any 
persons regularly accessing restricted areas of the marine terminals. 

[C] On May 24, 2011, Florida repealed, among other things, the 
portions of state law 311.12, which had required the state to conduct 
FBI and state criminal history record checks of all individuals 
seeking unescorted access to restricted and secure areas within the 
state's 12 active deepwater ports. These provisions of the Florida 
state law had been in place since 2000. According to a Port Everglades 
official, under this state program applicants were required to pay 
fees of $50 that included the criminal history record check and an 
administrative fee. 

[D] Port Everglades does not charge a fee for TWIC holders to obtain a 
port credential. Port Everglades also issues credentials (with a fee 
of $25) to those individuals who work only in a supportive or 
administrative position within port offices and do not access secure 
or restricted areas of the port. 

[E] Two separate governing agencies implement the background check and 
identification programs for workers seeking access to facilities at 
the Port of New York/New Jersey. The Waterfront Commission of New 
Harbor, a bi-state government agency, conducts criminal history record 
checks and issues an identification card to longshoremen seeking 
access to work at port facilities in New York and New Jersey. The Port 
Authority of New York/New Jersey does not conduct criminal history 
record checks on workers seeking access. However, the port authority 
requires truckers seeking access to register in its truck driver 
identification system, known as Sealink, and to obtain machine-
readable identification cards. 

[F] The Waterfront Commission of New York Harbor conducts state and 
FBI criminal history record checks on all longshoremen seeking a 
Waterfront Commission License, which is required to access Port of New 
York and New Jersey facilities. The Waterfront Commission charges 
varying fees to applicants depending upon whether they are New Jersey 
or New York residents. This includes $44.30 in New Jersey and $72.20 
in New York to cover the costs of the respective state. An additional 
$22 is charged to cover the cost of an FBI national criminal history 
check. 

[G] Previously, at the Port of Charleston, the South Carolina Port 
Authority charged an applicant a fee of $20 for enrollment and 
identification costs. However, a port official reported that the port 
had transitioned away from a physical card. Instead, the port had 
installed TWIC readers and was tying the applicant enrollment 
information to the TWIC card. 

[End of table] 

Benefits of Maritime Programs. Officials at ports with credentialing 
programs reported their programs were providing additional security 
benefits to those of the TWIC program. In particular, ports most 
commonly cited the following security benefits of their local 
credentialing programs: 

* Mechanism for Establishing Business Need: Governing officials from 
10 of 11 ports with additional programs reported that their local 
enrollment and identification served as a mechanism for establishing a 
valid business reason for an individual to access the secure or 
restricted areas of the port facility, in accordance with TSA and 
Coast Guard requirements. As discussed, under Coast Guard regulations, 
the possession of a TWIC itself is not sufficient to gain unescorted 
access to a secure area of a MTSA-regulated port facility--a facility 
operator must also ensure the applicant is authorized to be in the 
area.[Footnote 34] Because 10 of the 11 ports were requiring employer 
sponsorship, ports were using their enrollment and identification 
cards as a method for determining this business need. In this way, 
these local credentials are serving a purpose not included under TSA's 
TWIC enrollment process because--as we reported in May 2011--TSA's 
TWIC enrollment process does not require employer sponsorship. 
[Footnote 35] Instead, applicants attest to their need for a TWIC via 
their signature on the application. 

* Denying Credentials to Criminals: Governing officials from the five 
ports with active or prior background check requirements cited 
benefits their local programs provide over TWIC to control and monitor 
access to individuals with criminal history. For example, maritime 
port authorities seek to limit crime in their ports and thus officials 
from two ports reported that they required additional scrutiny of all 
TWIC holders who reported receiving their TWIC through the TWIC waiver 
process. The TWIC waivers enabled applicants with certain interim 
disqualifying criminal offenses, such as murder or unlawful weapons 
possession, to obtain a TWIC.[Footnote 36] For example, the Port of 
Miami, Port Everglades, and the Alabama State Port Authority provided 
us with a sample of individuals who had either been denied local 
credentials or had local credentials revoked.[Footnote 37] We provided 
TSA 30 of these names to confirm that they had valid TWICs. In 11 of 
the 30 cases, TSA adjudicators identified disqualifying criminal 
offenses but the applicants were ultimately approved for a TWIC 
through the redress process (waiver or appeals). Among those offenses 
committed by these 11 individuals were murder, attempted murder, 
carjacking and armed robbery, and unlawful possession of a firearm. 

In addition, officials from three ports reported criminal history 
record checks enabled them to target local risks facing their ports 
which are not addressed under TSA regulations for the TWIC program. 
For example, officials from the Port of Miami and the Waterfront 
Commission of New York Harbor told us that, while they recognized the 
threats posed by terrorism, crime was a major concern for their ports, 
particularly narcotics trafficking and cargo theft.[Footnote 38] 
Officials reported that by screening applicant criminal history 
records against certain additional disqualifying offenses to those of 
TWIC, such as theft, they were able to deny access to a population of 
felons they perceived as longstanding criminal risks facing the port 
who might be granted a TWIC. These governing entities reported denying 
credentials to applicants who had been granted TWICs. For example, 
between January 2009 and May 2011, the Port of Miami reported it had 
denied credentials to 101 applicants, including 52 valid TWIC holders. 
[Footnote 39] Port Everglades also reported it had denied credentials 
to applicants, including those with valid TWICs. Among those denied, 
was an individual convicted for conspiracy to possess with intent to 
distribute cocaine in 2007, yet issued a TWIC in 2010. According to 
these Port Everglades documents, this individual was arrested several 
times for other offenses, such as unlawful possession of a firearm, 
including a short-barrel shotgun and machine gun, and other narcotics 
offenses. 

Further, the three ports reported that they had mechanisms in place 
for conducting recurring criminal history checks on an ongoing basis 
through an automated "rap back" program.[Footnote 40] Specifically, 
the Waterfront Commission of New York Harbor, which conducts 
background checks for longshoremen at the Port of New York/New Jersey, 
has a mechanism in place that allows it to receive automated 
notifications on arrests and warrants. According to officials at the 
Waterfront Commission of New York Harbor, these notifications have led 
to the suspension and revocation of numerous longshoremen credentials. 
Examples from local credentialing programs of those who had TWICs but 
were denied by selected governing port authorities after local 
disqualifying criminal offenses were committed include the following: 

- An individual issued a TWIC in 2008, who was subsequently convicted 
of robbery and grand theft in 2010. The individual's local credential 
was revoked in December 2010. TSA identified this individual as having 
a valid TWIC as of July 2011. 

* Greater Access Control Than TWIC: At 9 of the 11 ports with 
additional programs, officials reported that having a local credential 
that could be verified by an existing access control system provided 
them the capability to better verify the card presented, while more 
quickly and effectively canceling access control to workers who 
violate security procedures. For example, a Florida port reported it 
revoked the local identification card of an individual because it had 
been notified by state law enforcement of the arrest of the cardholder 
for possession with intent to distribute cocaine. Officials noted that 
their programs were particularly important in verifying TWIC 
cardholders because the Coast Guard had yet to issue a final rule 
laying out requirements for electronic verification of TWICs. 

Costs of Maritime Programs. Some of the 11 ports with separate 
credentialing programs imposed additional costs. The costs were 
largely associated with administering the credentialing program. For 
the ports that charged a fee, the applicants were required to pay 
these fees in addition to their credentialing costs already incurred 
in obtaining their TWIC.[Footnote 41] We found that the nonfederal 
governing entities were charging applicant fees at 3 of 11 ports, 
ranging from $20 to $94.20. For these ports, applicant fees were 
generally covering costs for administering state and national FBI 
criminal history record checks. We found the fees among these ports 
differed based on the varying costs charged by governing entities for 
conducting the criminal history checks and whether an FBI criminal 
history record check was also required. For example, the Alabama State 
Port Authority conducts state criminal history record checks, and 
charges applicants a fee of $25 to cover the administrative costs for 
these checks and its port identification credential. According to the 
Alabama State Port Authority, applicant fees covered 70 percent of the 
costs of its program, with the remainder funded by operating revenues. 
[Footnote 42] Another agency, the Waterfront Commission--which 
requires applicants to successfully undergo a criminal history record 
check to obtain a license and credential authorizing their access to 
Port of New York and New Jersey facilities--charges applicants fees of 
up to $94.20 to cover the costs of both the FBI criminal history 
record check and either a New York or New Jersey criminal history 
records checks depending upon the applicant being a resident of New 
York or New Jersey. 

Labor and industry organizations have for several years raised 
concerns over the costs imposed by federal, state and local port 
requirements. For example, the International Longshoreman's 
Association has expressed concerns that allowing states to impose 
different requirements requiring multiple identification cards forces 
workers to go through additional review processes, and paperwork, and 
costs place an unfair burden on port workers, who would face redundant 
clearance processes. Other organizations, including the American 
Trucking Associations and the Owner-Operator Independent Drivers 
Association, have also raised cost concerns, particularly in that 
workers may be required to pay applicant fees to obtain multiple 
federal credentials. For example, with respect to federal requirements 
alone, generally a truck driver hauling hazardous materials is 
required to obtain a HME ($89.25 for TSA-managed states and more 
depending on state), and may also be required to obtain a TWIC 
($105.25, if an applicant already has a HME) if he or she sought 
access to a MTSA-regulated port facility. Depending on the port, a 
local credentialing requirement may add an additional cost to the 
worker. TSA is reportedly developing new regulations in addition to a 
technical solution to help reduce redundancies in TSA's Security 
Threat Assessment processes under its Transportation Infrastructure 
Modernization program.[Footnote 43] 

HME and Aviation Workers Credentialing Programs: 

HME Issuance by State Licensing Agencies. Under federal law and 
corresponding TSA regulations, states are prohibited from issuing a 
commercial drivers license with a hazardous materials endorsement to 
an individual unless TSA first conducts a Security Threat Assessment 
and determines that the individual does not pose a security risk. We 
found that four of the six states we contacted conducted additional 
state criminal history record checks on HME applicants, in addition to 
the national FBI criminal history record checks TSA conducted. 
[Footnote 44] Of these four states, three--Florida, Texas, and 
Maryland--were submitting the results to TSA for further review and 
action. These three states were not adjudicating the results of these 
criminal history checks, but sending the information to TSA as part of 
its HME Security Threat Assessment.[Footnote 45] The other state, New 
York, was the only selected state which conducted a separate vetting 
program for HME applicants.[Footnote 46] For example, in accordance 
with New York state law, New York state is required to conduct both a 
state criminal history check and an FBI criminal history check on all 
HME applicants. In addition, New York State's program includes 
additional disqualifying criteria beyond the HME related disqualifying 
criminal offenses considered under the TSA Security Threat Assessment. 
For example, New York's consideration of additional disqualifying 
criminal offenses not covered by TSA regulations includes larceny and 
burglary. The four states conducting criminal history record checks 
charged applicants additional fees as part of enrollment to cover the 
cost of required state criminal history record checks--ranging from 
$15 to $75. Table 2 summarizes the four selected states with 
additional background checking activities and requirements. 

Table 2: Four Selected States Conducting Criminal History Record 
Checks on HME Applicants: 

Selected state[A]: Florida; 
Additional disqualifying offenses to TSA: none; 
Different look-back period than TSA: no; 
Additional applicant cost for state criminal check: $36. 

Selected state[A]: Maryland; 
Additional disqualifying offenses to TSA: none; 
Different look-back period than TSA: no; 
Additional applicant cost for state criminal check: $42. 

Selected state[A]: New York; 
Additional disqualifying offenses to TSA: yes; 
Different look-back period than TSA: 10 years; 
Additional applicant cost for state criminal check: $75. 

Selected state[A]: Texas; 
Additional disqualifying offenses to TSA: none; 
Different look-back period than TSA: no; 
Additional applicant cost for state criminal check: $15. 

Source: GAO analysis of state information. 

[A] As reported between March and September 2011. 

[End of table] 

Airports. The eight airports we contacted reported they did not 
conduct additional background checks beyond those required by TSA--
which includes adjudicating the results of FBI criminal history record 
checks TSA provided. Unlike with the TWIC and HME programs, local 
authorities (airport operators and aircraft operators) are responsible 
for adjudicating the results of TSA-provided criminal history 
identified through automated FBI criminal history checks rap sheet, to 
determine whether applicants had potentially disqualifying offenses. 
In doing so, the airports may follow up with an applicant if the FBI 
rap sheet TSA provided lacks a disposition of a criminal offense--
which is necessary for the airports to determine if the applicant has 
potentially disqualifying criminal offenses. Although not required by 
TSA all of these airports required employer sponsorship to verify the 
employment of applicants and their need to access certain areas of the 
airport. In addition, unlike the TWIC program where only TSA can 
revoke a TWIC, under the Aviation Workers program airport authorities 
are the entities that revoke an airport issued credential--not TSA. 
[Footnote 47] For example, airports are to revoke a worker's 
identification badge if TSA determines a badgeholder poses a threat 
and may also do so if a worker violates airport security policy. 

Unlike the TWIC and HME programs which require new fingerprint-based 
criminal checks as part of the renewal process[Footnote 48], TSA 
regulations for airport operators do not require additional criminal 
history checks of workers with authorized access authority as long as 
workers maintain continuous employment with the same issuing 
authority. However, although not required by TSA regulation, some 
airports we contacted reported conducting fingerprint-based criminal 
history record checks on a random basis to identify potentially 
disqualifying criminal offenses that the identification holder may 
have committed since the initial Security Threat Assessment was 
conducted. 

In general, TSA credentialing-related regulations do not preempt state 
and local background checks or credentialing programs. Both maritime 
port authorities and state licensing agencies have implemented 
credentialing programs with requirements beyond those of TSA's TWIC 
and HME programs. While these programs have included additional costs 
to applicants, they have also provided nonfederal governing entities 
with additional tools for identifying potential threats and 
restricting access not offered under TSA's credentialing programs. 
Thus, these credentialing programs complement, rather than duplicate, 
the TSA programs we reviewed. 

TSA Faces Data and Staffing Challenges in Ensuring Effectiveness of 
its Security Threat Assessments of Transportation Workers: 

Additional Criminal History Record Information Could Strengthen TSA's 
Security Threat Assessments: 

Criminal history record checks are a key element of the Security 
Threat Assessment process for TSA's credentialing programs, helping to 
ensure that the agency detects those applicants with potentially 
disqualifying criminal offenses. As discussed earlier, TSA's criminal 
history record check compares an applicant's name and fingerprints 
against criminal history record information provided by the FBI, 
including from the FBI's National Crime Information Center and 
Interstate Identification Index.[Footnote 49] However, according to 
TSA, the access the agency currently has to criminal history 
information for making its eligibility determinations for its 
credentialing programs--including TWIC, HME, and Aviation Workers--has 
limitations. 

TSA reports that it has been difficult to effectively and efficiently 
conduct Security Threat Assessment adjudication of criminal history 
records due to the limited access it has as a noncriminal justice 
purposes requestor of criminal history records--and that this 
limitation had increased the risk that the agency was not detecting 
potentially disqualifying criminal offenses. Specifically, the level 
of access through which TSA receives criminal history record 
information through the FBI's Interstate Identification Index is the 
level of access accorded for noncriminal justice purposes. According 
to TSA, this level of access only allows a limited view of criminal 
history record information as opposed to a more expanded level of 
access accorded criminal justice agencies. The terms "noncriminal 
justice purposes" and "criminal justice" in this context, stem from 
the National Crime Prevention and Privacy Compact Act of 1998 (Compact 
Act).[Footnote 50] The Compact Act, enacted in 1998, in general, 
organizes an electronic information-sharing system among the federal 
government and the states to exchange criminal history records for 
noncriminal justice purposes authorized by federal or state law. The 
Compact Act also established a Compact Council with the authority to 
promulgate rules and procedures governing the use of the Interstate 
Identification Index system for noncriminal justice purposes, not to 
conflict with FBI administration of the Interstate Identification 
Index for criminal justice purposes.[Footnote 51] The Compact Act 
contains, among others, the following definitions: 

* Noncriminal justice purposes: The term noncriminal justice purposes 
means "uses of criminal history records for purposes authorized by 
Federal or state law other than purposes relating to criminal justice 
activities, including employment suitability, licensing 
determinations, immigration and naturalization matters, and national 
security clearances." 

* Criminal justice: The term criminal justice "includes activities 
relating to the detection, apprehension, detention, pretrial release, 
post-trial release, prosecution, adjudication, correctional 
supervision, or rehabilitation of accused persons or criminal 
offenders. The administration of criminal justice includes criminal 
identification activities and the collection, storage, and 
dissemination of criminal history records."[Footnote 52] 

As an agency categorized with a "noncriminal justice purposes" level 
of access to criminal history records information, TSA reports 
receiving limited access to certain types of criminal history data. 
For instance, when TSA sends the FBI its fingerprint submissions for 
credentialing program applicants, the FBI responds to TSA with 
criminal history record information including federal-level criminal 
history information, as well as state-level criminal history records 
obtained from any of the 15 states that participate in the FBI's 
National Fingerprint File Program.[Footnote 53] As a noncriminal 
justice agency, TSA reports that its access to state criminal history 
information from other states is more limited than the level of access 
available to criminal justice agencies which provides access to 
criminal history record information from all 50 states plus the 
District of Colombia. Thus, TSA reports that its visibility to 
applicant criminal history records is often incomplete because the 
provided information excludes details regarding dispositions, 
sentencing, release dates, and probation or parole violations, among 
others. TSA reported that this lack of visibility to additional 
criminal history record information via the FBI's Interstate 
Identification Index system hinders its ability to fulfill its 
homeland security mission and conduct Security Threat Assessments with 
more detailed and complete information for its credentialing programs. 
[Footnote 54] 

According to a 2006 Department of Justice report[Footnote 55] while 
the FBI's Interstate Identification Index is comprehensive in its 
coverage of nationwide arrest records for serious offenses, it is 
still missing final disposition information for approximately 50 
percent of its records.[Footnote 56] For example, the FBI reported 
that information states submitted into its systems was not always 
complete or current and that state repositories often reported having 
more complete or current information than what was forwarded to and 
maintained in FBI systems.[Footnote 57] As a result, state criminal 
history repositories contain records, such as arrests and convictions, 
not included--or indexed--as part of the FBI's databases. For this 
reason, according to the 2006 Department of Justice report, checks of 
state databases, in addition to an FBI check, are considered necessary 
to get more comprehensive data. 

According to TSA, being provided "noncriminal justice purposes" level 
of access also affects its ability to run the FBI database checks 
using the fingerprints collected at enrollment on a recurring basis to 
identify potentially disqualifying criminal history of an active 
credential holder. Under the Compact Act, subject fingerprints or 
other approved forms of positive identification must be submitted with 
all requests for criminal history record checks for "noncriminal 
justice purposes."[Footnote 58] Thus, to conduct fingerprint-based 
check on an ongoing basis for previously approved individuals, TSA 
would have to submit prints and pay a fee to the FBI (funded by an 
applicant fee) each time it wanted to have a criminal history record 
check run.[Footnote 59] According to DHS Screening Coordination Office 
officials, all of the agency's credentialing programs which include a 
criminal history record check have weaknesses similar to what we 
reported in our May 2011 report on the TWIC program. In that report, 
we stated that TSA's controls for TWIC were not designed to determine 
whether TWIC holders have committed disqualifying crimes at the 
federal or state level after being granted a TWIC.[Footnote 60] In 
particular, we noted that TSA conducts criminal history record checks 
only during enrollment or a name-based check of TWIC holders against 
federal wants and warrants on an ongoing basis, but it did not run the 
broader FBI fingerprint based check using fingerprints collected at 
enrollment on an ongoing basis.[Footnote 61] 

TSA has noted that it does not fit neatly into a criminal justice or 
noncriminal justice definition and asserts that its Security Threat 
Assessments require both criminal justice and noncriminal justice 
functions.[Footnote 62] Within this context, TSA is seeking an 
expanded level of access to FBI's Interstate Identification Index 
system data, beyond a "noncriminal justice purposes" level of access, 
to a level of access similar to that accorded criminal justice 
agencies. TSA's position, in general, is that the Compact Act 
definitions of "criminal justice" and "noncriminal justice purposes" 
do not mandate that TSA Security Threat Assessment functions only be 
accorded a noncriminal justice purposes level of access. With respect 
to the term "noncriminal justice purposes," it is TSA's position that 
its statutorily mandated Security Threat Assessments are not the same 
as employment or licensing background suitability checks listed in the 
"noncriminal justice purposes" definition. TSA's position is that its 
obligation to detect individuals with specific convictions to minimize 
the threat to transportation systems require greater access to the 
FBI's data. 

The FBI's position, in general, is that TSA is not a criminal justice 
agency, that the functions it performs are "noncriminal justice" in 
nature, and that, as such, based upon a plain reading of federal law, 
the FBI cannot legally provide TSA with criminal justice access to 
criminal history records information. The FBI notes that the Compact 
Act specifically defined "noncriminal justice purposes" as "uses of 
criminal history records for purposes authorized by Federal or State 
law other than purposes relating to criminal justice activities, 
including employment suitability, licensing determinations, 
immigration and naturalization matters, and national security 
clearances." It is the FBI's position that TSA's requests for criminal 
history record information fall within this "noncriminal justice 
purposes" definition and, as such, the FBI is not authorized to 
provide TSA with criminal justice access to criminal history record 
information. FBI additionally notes that a broad interpretation of the 
Compact Act outside of its plain meaning would violate the Compact Act 
related laws of the 29 states that have signed the Compact as well as 
the contractual agreement that the United States Government entered 
into with these states. 

TSA is collaborating with the FBI and the Compact Council to identify 
possible options for obtaining greater access to criminal history 
record information for its Security Threat Assessments. Since 2010, 
TSA has made several presentations to members of the Compact Council 
seeking a criminal justice-like access to FBI databases. While the FBI 
and Compact Council have not agreed with TSA's position seeking a 
level of access similar to that accorded criminal justice agencies, 
the FBI has taken steps to provide TSA access to criminal history 
related information. In particular, FBI reported pursuing technical 
solutions that would expand the extent of state level criminal history 
available to TSA--as well as to other federal agencies classified as 
noncriminal justice agencies that may seek criminal history access 
through FBI's systems. For example, as a longer-term technical 
solution scheduled to be operational in 2014, FBI is planning to 
enhance its Integrated Automated Fingerprint Identification System to 
allow for automated noncriminal justice access to obtain additional 
information from 36 states, including the 15 National Finger Print 
File states and an additional 21 states. 

The FBI, as an interim technical solution, reported plans to provide 
federal agencies improved functionality similar to its longer-term 
plan. The FBI reports that a pilot for this program was to begin in 
October 2011 with TSA serving as the first participating federal 
agency.[Footnote 63] According to an FBI study, these technical 
solutions may provide TSA with additional criminal history information 
for roughly 15 percent of its credentialing program applicant 
population. However, TSA reported that while such an enhancement would 
be an improvement from current processes, a substantial amount of 
state's records will remain inaccessible. 

According to Standards for Internal Control in the Federal Government, 
effective internal controls provide for an assessment of the risks the 
agency faces from both internal and external sources. Management must 
decide upon internal control activities required to mitigate those 
risks and achieve the objectives of efficient and effective 
operations. As part of this, management should design and implement 
internal controls that are informed by the identified risks the 
program faces, the possible effect of those risks, control activities 
required to mitigate those risks, and the costs and benefits of 
mitigating those risks.[Footnote 64] TSA and the FBI have shared goals 
in detecting potential terrorist and criminal threats posed to the 
nation's transportation facilities. The agencies have continued a 
dialogue on options, and the FBI is implementing technical solutions 
which may improve the criminal history information available to TSA. 
However, the two agencies have not jointly determined the extent to 
which a potential security risk may exist with respect to the level of 
access to criminal history records information that TSA currently 
receives to complete Security Threat Assessments. Conducting such an 
assessment which leverages ongoing coordination with the Compact 
Council, would help address potential security risks that may exist 
with respect to the level of access to criminal history record 
information currently received by TSA for conducting Security Threat 
Assessments, and could be used to help inform discussions about 
possible alternatives to address any risks, and the costs and benefits 
of pursuing each alternative. 

TSA Could Better Leverage Available State Criminal History Data: 

TSA could further strengthen its Security Threat Assessment process by 
leveraging certain existing flows of state criminal history 
information already provided by some nonfederal governing entities for 
its HME program. As discussed earlier, four of the states we contacted 
reported conducting their own state criminal history record checks for 
applicants seeking an HME. Three of these four states reported sending 
the results of their state criminal history checks directly to TSA for 
consideration as part of its Security Threat Assessments--Florida, 
Texas, and Maryland. However, TSA HME program officials reported that 
the agency had generally not reviewed and considered the state-
provided criminal history information from all of these states. 

TTAC officials acknowledged that the additional information they were 
receiving from some states may help the agency identify potentially 
disqualifying offenses among HME applicants. However, TSA reported 
that it has not established a mechanism to efficiently capture the 
information from all of the states that were directly providing the 
information. For example, the TTAC Adjudication Center uses a web-
enabled system--known as its Screening Gateway--as its primary tool 
for gathering, viewing, and synthesizing applicant case information 
for each Security Threat Assessment. In this way, all vetting 
information is compiled into a single case record for adjudicator 
review. For example, TSA has in place a mechanism for Florida to 
transmit applicant state criminal history results electronically to 
TSA for adjudication, but it does not have such a mechanism to 
electronically capture the information from other states providing the 
information.[Footnote 65] TSA officials reported that reviewing the 
information outside of its web-based case system would be time 
consuming and result in delays in processing the Security Threat 
Assessment adjudication caseload--which TSA officials noted was over 
12,000 cases per month for the HME program alone. 

According to TSA records, the agency has met with officials from 
states that directly provided criminal history records information to 
discuss the technical steps that would be necessary for them to send 
TSA criminal history information in a manner that TSA may effectively 
use. According TSA documentation, as of March 2010 TSA reported that 
more research was necessary to identify technical steps necessary to 
achieve a solution that would allow TSA to leverage the directly-
provided criminal history information. 

TSA reported it has sought possible solutions to receive data directly 
from other states in an automated solution. However, the agency has 
faced obstacles because states have varying data systems and legal and 
practical constraints requiring TSA to develop unique solutions for 
obtaining data from a state. As a result, TSA reported it was pursuing 
a common technical solution for obtaining state criminal information 
through the agency's TTAC Infrastructure Modernization Program. 
Nonetheless, TSA's schedule for the modernization program indicates 
that it will not be completed until late 2015 and TSA has yet to 
determine how the program would integrate existing streams of criminal 
history provided by states. Moreover, TSA reported that future efforts 
to obtain additional state criminal information may require TSA to pay 
additional fees to states and the cost of these fees may need to be 
funded by increasing applicant fees for TSA credentialing programs. 
However, not all states are currently charging TSA additional fees for 
the criminal history information they already provide. A senior 
official with the one state which provided TSA criminal history record 
information reported that his agency continued to do so because of 
concerns that TSA was adjudicating HME applications without the 
benefit of criminal history information, and had offered to make its 
records available to TSA in a number of electronic formats. 

Standards for Internal Control in the Federal Government highlights 
the need for capturing information needed to meet program objectives 
and assessing the risks agencies face. TSA has reported that it needs 
access to all credible, reliable, and current information possible to 
meet its mission requirements for its credentialing programs and has 
been impeded in doing so because it lacks access to state criminal 
history information. Reviewing these state-provided criminal history 
records may help TSA address this challenge. TSA reported that more 
research was required to determine a format for integrating the 
information, and implementing a solution would carry costs for the 
agency. Conducting and documenting an assessment of the risks 
associated with not using the information--which considers existing 
and potential technical and staffing requirements, as well as 
analyzing the costs and benefits of establishing a format to integrate 
the information--may help TSA mitigate its reported access limitations 
and better meet its mission needs. 

TTAC Adjudication Center Workforce Challenges: 

The TTAC Adjudication Center has been challenged to meet its workload 
requirements since it began conducting operations in 2005. According 
to the TTAC Adjudication Center's current staffing plan, last released 
in February 2011, insufficient federal staff has hampered the 
Adjudication Center's ability to meet its workload requirements and 
ensure necessary oversight of the credential decision-making process. 
Among other things, the plan states that staffing limitations had left 
the center unable to perform quality assurance and oversight 
responsibilities, conduct necessary redress activities, and issue 
"Initial Determinations of Threat Assessments" in a timely manner. 
[Footnote 66] According to a senior TTAC Adjudication Center official, 
the Adjudication Center has faced recurring challenges in meeting its 
workload since it began operations--largely related to TSA's reliance 
on contractor staff as its primary adjudicator workforce. As of July 
2011, 72 percent (38 of 53) of Adjudication Center staff were 
contractors.[Footnote 67] The challenge is that TSA has used three 
different contractors since establishing the adjudication center in 
2005, and on each occasion the turnovers have led to backlogs as the 
TTAC adjudication center hired and trained new staff.[Footnote 68] 
According to the official, federal staff must train each new set of 
contractors, and it has taken about 8 to 10 months for new contractors 
to become proficient so they may assume their full responsibilities. 
Because the Adjudication Center relies on contract staff to adjudicate 
the majority of its caseload, the contractor turnover has required the 
federal staff to take on additional work during these periods. 
According to the Adjudication Center official, federal staff have 
needed to regularly work overtime over the past five years to meet 
workload requirements. The official also noted that, whereas there has 
been considerable turnover with respect to contractors, the 
Adjudication Center has seen little turnover among its federal staff, 
with only two federal adjudicators leaving the center since operations 
began. 

According to TSA data for the period of July 2010 through June 2011, 
the TTAC Adjudication Center adjudicated an average of approximately 
36,000 cases a month involving TWIC, HME, and Aviation Workers Program 
applicants, including initial cases where automated background check 
results included potentially derogatory information and redress cases, 
such as applicant requests for a waiver or appeal to a prior 
determination.[Footnote 69] Figure 2 shows the average monthly 
enrollment and TTAC Adjudication Center caseload for the TWIC, HME, 
and Aviation Workers programs--July 2010 through June 2011. 

Figure 2: Average Monthly Program Enrollment and TTAC Adjudication 
Center Caseload for Reviewing Applicants with Potentially 
Disqualifying Information for TWIC, HME, and Aviation Workers 
Programs--July 2010 through June 2011: 

[Refer to PDF for image: vertical bar graph] 

Aviation workers: 
Average number of monthly program enrollments: 29,636; 
Average monthly TTAC adjudication center caseload: 6,561. 

HME: 
Average number of monthly program enrollments: 24,287; 
Average monthly TTAC adjudication center caseload: 14,110. 

TWIC: 
Average number of monthly program enrollments: 24,239; 
Average monthly TTAC adjudication center caseload: 15,308. 

Source: GAO analysis of TSA data. 

[End of figure] 

TSA reported that it chose to use contract adjudicators when the 
Adjudication Center was created because it considered them to be the 
most readily available workforce and the most effective way to augment 
federal staff with skilled resources. We have previously reported that 
to mitigate risks associated with using contractors, agencies have to 
understand when, where, and how contractors should be used given the 
risk of diminished institutional capacity, potentially greater costs, 
and mission risks.[Footnote 70] Further, in July 2009, through its 
Balanced Workforce Strategy, DHS instructed components to review 
current contracts to determine if inherently governmental work was 
included in the work requirements.[Footnote 71] 

TSA awarded a new adjudication center contract in February 2010 that 
runs through January 2015. This contract includes a 1-year base period 
with four, 1-year options. Under this contract, based on the 
performance of the contractor, TSA may select another contractor 
within the next 5 years which could result in a change in its 
adjudicator workforce--and pose risks to the Adjudication Center's 
sustainability and performance in meeting mission requirements. 
[Footnote 72] Furthermore, TSA anticipates expanding the Adjudication 
Center caseload considerably for additional credentialing programs, 
which may further exacerbate these challenges.[Footnote 73] Strategic 
workforce planning includes aligning an organization's human capital 
program with its current and emerging mission and developing long-term 
strategies for acquiring, developing, and retaining staff to achieve 
these goals.[Footnote 74] TSA reported that it initiated an assessment 
in March 2011 to determine if adjudication functions are appropriate 
to be performed by a contractor workforce, or if the work is 
inherently governmental and if there would be a cost savings resulting 
from conversion of the contract positions to government personnel. 
However, in September 2011, TSA reported that it did not have a date 
for when the study would be complete. Completing this assessment could 
help TSA address the risk that the agency may be using nonfederal 
employees to perform inherently governmental functions in its 
Adjudication Center. Moreover, the Adjudication Center's most recent 
workforce staffing plan does not address issues related to its growing 
workload or the impact of the use of contractors for potentially 
inherently governmental functions. Updating its staffing plan to 
clarify how the Adjudication Center will effectively and efficiently 
meet its current and emerging workload requirements, based in part on 
the results of TSA's study, and developing timelines for doing so will 
help ensure that TTAC can effectively meet its growing workload. 

Conclusions: 

The state and local credentialing programs we reviewed complement, 
rather than duplicate, TSA's credentialing programs. In addition to 
working with state and local entities, TSA also works with the FBI to 
protect the nation's transportation systems from terrorist and 
criminal threats. Both agencies rely on timely, relevant criminal 
history data to do so. While TSA, the FBI, and Compact Council have 
collaborated on the issue, TSA and the FBI have not completed a joint 
analysis identifying whether a potential security risk may exist with 
TSA's present level of access to FBI criminal records as a 
"noncriminal justice purposes" requesting agency. Conducting an 
assessment which identifies the pros and cons of potential solutions 
to mitigate any potential risks could increase the rigor of the 
Security Threat Assessment, benefit federal and state decision-makers 
and better inform Congress about the potential weaknesses and their 
implications. Although TSA has reported seeking additional access to 
state-level criminal history, the agency has not leveraged some 
existing information it already receives directly from states. 
Conducting an assessment of the risks associated with not using the 
information, as well as the costs and benefits, such as technical 
barriers, to integrating the information into the current adjudication 
process, may help TSA strengthen its process and better meet its 
mission needs. 

Since 2005, TSA's Adjudication Center has been responsible for 
ensuring that the millions of TSA credentialing program applicants do 
not pose a security risk to the United States, and these 
responsibilities are expected to grow considerably as TSA assumes 
additional responsibility for adjudicating Security Threat Assessments 
for additional credentialing programs which may double or triple its 
current workload. Thus, it is incumbent on TSA to complete its 
reported study to determine whether the use of contractors for its 
Adjudication Center is an inherently governmental function and if 
there would be a cost savings resulting from conversion of the 
contract positions to government personnel. Completing this assessment 
could help TSA address the risk that the agency may be using 
nonfederal employees to perform inherently governmental functions in 
its Adjudication Center. Moreover, updating its workforce staffing 
plan to define how the Adjudication Center will effectively and 
efficiently meet its current and emerging workload requirements, based 
in part on the results of TSA's study, and developing timelines for 
doing so, will help ensure that TTAC can effectively meet its current 
and growing workload. 

Recommendations for Executive Action: 

We recommend that the Secretary of Homeland Security direct the TSA 
Administrator, and the Attorney General of the United States direct 
the Director of the FBI, to jointly assess the extent to which a 
security risk may exist with respect to the level of access to 
criminal history records information currently received by TSA to 
complete Security Threat Assessments, identify alternatives to address 
any risks, and assess the costs and benefits of pursuing each 
alternative. 

We also recommend that the Secretary of Homeland Secretary direct the 
TSA Administrator to take the following two actions: 

* Conduct an assessment of the risks associated with not utilizing 
some state-provided criminal history information, as well as an 
analysis of the costs and benefits of integrating the information into 
the current adjudication process. 

* Develop a workforce staffing plan with timelines articulating how 
the TTAC Adjudication Center will effectively and efficiently meet its 
current and emerging workload requirements, and incorporate the 
results of TSA's study examining the appropriateness and costs and 
benefits of using contractors. 

Agency Comments and Our Evaluation: 

We provided a draft of this report to DHS and DOJ for their review and 
comment. DHS, in written comments received November 30, 2011, 
concurred with all three of the recommendations in the report directed 
to DHS, and identified actions taken, planned, or under way to 
implement the recommendations. In an email received November 29, 2011, 
the DOJ audit liaison stated that DOJ concurred with the one 
recommendation we directed to DOJ in the report. Written comments are 
summarized below and official DHS comments are reproduced in appendix 
VI. In addition, both DHS and DOJ provided written technical comments, 
which we incorporated into the report, as appropriate. 

In commenting on the draft report, DHS and DOJ described efforts the 
departments have underway or planned to address our recommendations. 
However, as discussed below, additional actions are needed to ensure 
that our recommendations are fully implemented. Both DHS and DOJ 
concurred with our first recommendation that the FBI and TSA jointly 
assess the extent to which a security risk may exist with respect to 
the level of access to criminal history records information currently 
received by TSA to complete Security Threat Assessments, identify 
alternatives to address any risks, and assess the costs and benefits 
of pursuing each alternative. DOJ stated that the FBI remains 
concerned that readers must understand that the level of access 
afforded to TSA to FBI criminal history records information for 
Transportation Worker Security Threat Assessments is one prescribed by 
law and not merely an opinion of the FBI's. DHS stated that it 
recognizes that there are criminal records at the state level which 
TSA does not receive, and noted that its level of criminal history 
information access is equal to that of a private company doing an 
employment check on a new applicant. DHS stated that it has been 
working with DOJ, the FBI and the states for several years to obtain 
more comprehensive access to criminal history record information, and 
cited plans for pilot programs with the FBI for accessing additional 
state criminal history records information--including a pilot to 
obtain information from over 20 additional states that respond to 
noncriminal justice requests through the FBI's Interstate 
Identification Index. DHS stated that as the pilots progress, TSA will 
work with the FBI to identify the differences between the standard FBI 
criminal history record information noncriminal justice results and 
the additional state data. DHS noted that TSA will work with the FBI 
to include these results in the overall assessment of risks regarding 
TSA's current level of criminal history record information access. 

DHS also concurred with our second recommendation for TSA to conduct 
an assessment of the risks associated with not utilizing some state-
provided criminal history information. DHS stated that while TSA 
concurred with the intent of the recommendation, it was no longer 
necessary to conduct a risk or cost and benefit analysis because it 
has identified a solution to incorporate state-provided criminal 
history records information into its adjudication process. Since DHS 
reported identifying this solution after we provided our draft report 
to the agencies for comment, we will continue to work with TSA to 
monitor progress on the proposed solution as it proceeds. 

DHS concurred with our third recommendation that TSA develop a 
workforce staffing plan with timelines articulating how the TTAC 
Adjudication Center will effectively and efficiently meet its current 
and emerging workload requirements, and incorporate the results of 
TSA's study examining the appropriateness and costs and benefits of 
using contractors. DHS stated that it is currently meeting its 
Adjudication Center workload requirements and provided us with a copy 
of the workforce staffing plan. TSA stated that it recognizes the 
importance of appropriately balancing its federal and contractor 
workforce and in 2010 began a review to ensure that the right 
workforce balance is achieved. DHS stated that TSA is analyzing the 
results of this review to achieve the best balance of federal and 
contractor resources as part of the Department-wide Balanced Workforce 
Strategy, and that the results would be available once finalized. 
Lastly, DHS noted that TSA would continue to assess the staffing needs 
of the Adjudication Center to implement emerging requirements based on 
the results of the Balanced Workforce Strategy. However, these actions 
do not fully address the intent of our recommendation. As we have 
noted, the staffing plan TSA provided cited challenges the 
Adjudication Center faced in meeting workload requirements--such as 
staffing limitations leaving the center unable to perform quality 
assurance and oversight responsibilities, conduct necessary redress 
activities, and issue "Initial Determinations of Threat Assessments" 
in a timely manner. Given the significant challenges cited, it is 
unclear whether TSA is fully meeting current Adjudication Center 
workload requirements. Since TSA reports it no longer faces challenges 
in meeting its workload, it will be important for TSA to update the 
February 2011 staffing plan TSA provided. Lastly, TSA reported that it 
began a review to determine that the right workforce balance is 
achieved. As discussed earlier, TSA reported this review is to 
determine if adjudication functions are appropriate to be performed by 
a contractor workforce, or if the work is inherently governmental and 
if there would be a cost savings resulting from conversion of the 
contract positions to government personnel. However, TSA has yet to 
complete this assessment nor provide timelines for doing so. 
Completing this study and incorporating the results of this assessment 
into an updated staffing plan remains important for TSA to help ensure 
it appropriately and effectively meets its Adjudication Center 
workload. 

We are sending copies of this report to the Secretary of Homeland 
Security, the Assistant Secretary for the Transportation Security 
Administration, the Commandant of the United States Coast Guard, the 
Attorney General of the United States, the Director of the Federal 
Bureau of Investigation, and appropriate congressional committees. In 
addition, this report is available at no charge on the GAO Web site at 
[hyperlink, http://www.gao.gov]. 

If you or your staff have any questions, please contact me at (202) 
512-4379 or lords@gao.gov. Contact points for our Offices of 
Congressional Relations and Public Affairs may be found on the last 
page of this report. Key contributors to this report are listed in 
appendix VII. 

Signed by: 

Stephen M. Lord: 
Director: 
Homeland Security and Justice Issues: 

[End of section] 

Appendix I: Objectives, Scope, and Methodology: 

To identify the roles and responsibilities of federal and nonfederal 
government entities related to the Transportation Security 
Administration's (TSA) transportation security credentialing-related 
programs, we first identified those programs which place certain 
responsibilities on state and local governments. To do this, we 
analyzed relevant statutes, including pertinent provisions of the 
Uniting and Strengthening America by Providing Appropriate Tools 
Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 
2001,[Footnote 75] the Aviation and Transportation Security Act, 
[Footnote 76] and the Maritime Transportation Security Act (MTSA) 
[Footnote 77] of 2002, plus relevant Department of Homeland Security 
(DHS) regulations that set out corresponding requirements for TSA and 
nonfederal governing entities with respect to conducting background 
checks and issuing identification to transportation workers. 

We also reviewed documentation provided by TSA, such as program 
summaries, which outlined the respective roles and responsibilities of 
federal and nonfederal governing entities under 17 different 
credentialing programs. On the basis of this information, we focused 
our analysis on comparing nonfederal transportation worker 
credentialing programs with three TSA credentialing programs--the 
Transportation Worker Identification Credential Program, Hazardous 
Materials Endorsement Program, and Aviation Workers Program--because 
they placed certain regulatory responsibilities on nonfederal 
governing entities. Of the 17 TSA credentialing programs, only the 
Transportation Worker Identification Credential (TWIC), Hazardous 
Materials Endorsement (HME) Threat Assessment, and Aviation Workers 
programs include nonfederal governing entity responsibilities. 

We further examined TSA documentation describing, among other things, 
the roles and responsibilities of various entities for enrolling 
applicants, conducting background checks, and issuing credentials. We 
also interviewed headquarters and field officials at relevant 
agencies, including DHS (TSA, Screening Coordination Office, Coast 
Guard); Department of Justice Federal Bureau of Investigation (FBI) 
and Department of Transportation (DOT). In addition, we interviewed 
officials from nine stakeholder organizations that represent the broad 
spectrum of nonfederal governing entity interests in TSA's programs, 
such as the American Association of Port Authorities and the American 
Trucking Association to help identify nonfederal government entity 
credentialing programs and perspectives on TSA's credentialing 
programs.[Footnote 78] 

To determine how selected nonfederal governing entities' credentialing 
programs compare to TSA's programs, we analyzed pertinent federal 
laws, such as MTSA and the USA PATRIOT Act, and corresponding 
regulations related to the TWIC, HME, and Aviation Workers programs, 
as well as operational guidance and TSA policy documents for 
implementing the programs. By reviewing these laws, regulations, and 
policies, we identified requirements applicable to TSA and state and 
local governing agencies, as well as applicant eligibility standards 
such as lists of disqualifying criminal offenses and duration of time 
that agencies were required to consider these disqualifying criminal 
offenses ("look back period"). We then compared these standards and 
practices with those of identified programs that placed certain 
responsibilities upon nonfederal governing agency (state or local) 
programs we identified. 

Through structured questions (in-person, phone, and email), we 
obtained information about credentialing programs and requirements in 
place by state and local governing agencies at selected maritime 
ports, airports, and state agencies. First, we collected information 
from maritime port authorities or other responsible nonfederal 
governing agencies at 17 maritime port locations--including the top 10 
ports by container volume in 2010--plus 7 other ports we identified as 
having programs in place through information we obtained from industry 
groups, state agencies, and the U.S. Coast Guard. Collectively, the 17 
maritime ports accounted for over 93 percent of U.S. waterborne 
foreign container trade in 2010, according to the U.S. Maritime 
Administration.[Footnote 79] We visited officials at 5 of these 
locations based on whether a state or local port authority had in 
place a credentialing program outside of TSA's TWIC program 
(Baltimore, Maryland; Norfolk, Virginia; Miami and Port Everglades, 
Florida; and New York, New York). Second, we collected information 
from 8 category X[Footnote 80] airports including four of the top six 
airports by passenger boardings in 2009 plus 4 additional airports 
based on proximity to GAO locations.[Footnote 81] The eight airports 
accounted for 23 percent of total U.S. domestic passenger boardings in 
2009, according to the Federal Aviation Administration. We conducted 
site visits to three of these airports (Seattle-Tacoma International 
Airport, Washington Dulles International Airport, and Baltimore-
Washington International Airport). Third, with respect to HME 
issuance, we collected information from six states, including the top 
five states as ranked by commercial drivers license issuance based on 
DOT data as of December 2010, plus one additional state that we 
identified as having additional requirements.[Footnote 82] As of 
December 2010, the six states we contacted accounted for approximately 
one-third of the over 14 million commercial drivers licenses issued in 
the United States, according to information from DOT.[Footnote 83] We 
visited officials at two state licensing agencies (New York State and 
Maryland). During our visits to maritime port facilities, state 
commercial drivers license issuing agencies, and airports, we 
interviewed officials, observed enrollment operations centers, and 
also reviewed cases of individuals who had been denied issuance of a 
state or local credential. Specifically, we obtained information from 
selected nonfederal government entities which included background 
check requirements as part of their credentialing programs. We 
obtained case information from these entities detailing denial of 
applicants' credentials. As part of this, we obtained case information 
from three ports with respect to individuals the port reported denying 
to or revoking local credentials from, because they had disqualifying 
criminal offenses based upon state program criteria. We provided 
information on 30 of these cases to TSA and then obtained case 
information on these 30 individuals from TSA--including whether TSA 
had identified these individuals as having potentially disqualifying 
criminal histories, whether they had obtained their TWIC through a 
waiver, and whether they had a valid TWIC as of July 1, 2011. While 
the information we obtained from nonfederal governing entity programs 
cannot be generalized across all states and localities, it provided us 
with a perspective on how state and local government transportation 
worker programs compare with federal programs and requirements. 

To obtain information on challenges, if any, TSA faced in ensuring the 
effectiveness of its credentialing-related programs, we reviewed our 
prior reports related to the TWIC program and analyzed pertinent laws 
and regulations, including the National Crime Prevention and Privacy 
Compact Act of 1998.[Footnote 84] We then analyzed TSA and FBI program 
documentation, including program training manuals, staffing plans, and 
other documents detailing program processes and challenges TSA faced, 
for the TWIC, HME, and Aviation Workers credentialing-related 
programs. In addition, we reviewed and compared TSA data detailing the 
number of enrollments and adjudication caseload for TSA's TWIC, HME, 
and Aviation Workers programs--covering the period of July 2010 
through June 2011. Through interviews with knowledgeable TSA officials 
we determined that these data were sufficiently reliable for our 
purposes. To further obtain information on TSA credentialing-related 
practices and challenges, we interviewed headquarters officials from 
TSA's Transportation Threat Assessment and Credentialing (TTAC) 
program responsible for implementing the TWIC, HME, and Aviation 
Workers programs, DHS's Screening Coordination Office, responsible for 
coordinating credentialing programs across DHS; and the FBI's Criminal 
Justice Information Services Division, which maintains the FBI's 
national criminal history repository. We also visited the TTAC 
Adjudication Center in Herndon, Virginia to interview officials 
responsible for adjudicating TSA credentialing program applications 
and observe operations. We then evaluated the processes against TSA's 
credentialing program mission needs and Standards for Internal Control 
in the Federal Government.[Footnote 85] 

Additionally, we obtained the perspectives of nonfederal agency 
stakeholders, including officials from two organizations representing 
state criminal justice repository agencies--the National Crime 
Prevention and Privacy Compact Council[Footnote 86] and SEARCH. 
Collectively, these two organizations represent state criminal 
repository agencies from 50 states and the District of Columbia. The 
information we obtained through our interviews with nonfederal 
government entities and stakeholder organizations are not 
generalizable, but provided valuable perspectives related to TSA's 
TWIC, HME, and Aviation Workers programs. 

We conducted this performance audit from February through November 
2011 in accordance with generally accepted government auditing 
standards. Those standards require that we plan and perform the audit 
to obtain sufficient, appropriate evidence to provide a reasonable 
basis for our findings and conclusions based on our audit objectives. 
We believe that the evidence obtained provides a reasonable basis for 
our findings and conclusions based on our audit objectives. 

[End of section] 

Appendix II: TSA Credentialing Programs: 

TSA implements 17 credentialing programs which include conducting 
background checks--known as Security Threat Assessments--for a 
reported population of over 15 million individuals, such as those 
accessing airports, maritime ports, as well as for individuals seeking 
a hazardous material endorsement to their commercial driver's license. 
The following table identifies and describes these programs. 

Table 3: TSA Credentialing Programs: 

Program: Airspace Waiver Program; 
Description: TSA conducts a Security Threat Assessment on passengers 
and crew of flight operations into restricted U.S. airspace, flight 
operations into the U.S. for carriers that do not hold a TSA-approved 
security plan, and for all flight operations that transit US airspace 
without a takeoff or landing in the US (over flights) that do not hold 
a TSA-approved security plan. 

Program: Alien Flight Student Program; 
Description: TSA conducts a Security Threat Assessment on foreign 
students seeking new or recurrent training at flight schools regulated 
by the Federal Aviation Administration (FAA). 

Program: Aviation Workers Program; 
Description: Requires a Security Threat Assessment on individuals who 
apply for, or are issued personnel identification media at U.S. 
domestic airports, including airport facility workers, retail 
employees, and airline employees. TSA adjudicates terrorist and 
immigration checks, while airports adjudicate criminal history checks. 

Program: Certified Cargo Screening Program; 
Description: Participation in this program is currently voluntary. As 
part of participation, TSA conducts a Security Threat Assessment on 
individuals who screen and work at a Certified Cargo Screening 
Facility. 

Program: DCA Access Standard Security Program; 
Description: TSA conducts a Security Threat Assessment on all flight 
crewmembers (e.g. cockpit crew, flight attendants, cargo carrier 
employees) and passengers on non-commercial aircraft (non-cargo) 
flying into Ronald Reagan National Airport (DCA) from 1 of 22 domestic 
gateway airports or out of DCA. 

Program: FAA Airmen Certificate Program; 
Description: TSA conducts a Security Threat Assessment on all FAA 
Airmen Certificate holders and applicants for a certificate based on a 
foreign license. 

Program: Full All Cargo Security Program; 
Description: TSA conducts a Security Threat Assessment on certain 
individuals with unescorted access to air cargo for each operation 
that is in an aircraft with a maximum certification takeoff weight of 
more than 45,500 kg (100,309.3 pounds) and carrying cargo and 
authorized persons and no passengers. 

Program: Hazardous Materials Endorsement Threat Assessment Program; 
Description: TSA conducts a Security Threat Assessment on drivers 
wishing to obtain a hazardous materials endorsement on a state-issued 
commercial driver's license. 

Program: Indirect Air Carrier Program; 
Description: TSA conducts a Security Threat Assessment on individuals 
who perform screening, supervise screening, or have unescorted access 
to air cargo bound for commercial airlines, as well as qualified 
shippers and certain individuals in managerial or ownership roles of 
an indirect air carrier. 

Program: Maryland Three Program; 
Description: TSA conducts a Security Threat Assessment on pilots who 
operate aircraft and apply for privileges to fly to or from the three 
General Aviation airports in the Washington, D.C. restricted flight 
zones (Potomac Airport, Washington Executive/Hyde Field, and College 
Park Airport). 

Program: Merchant Mariner Credential; 
Description: TSA and Coast Guard conduct a Security Threat Assessment 
and safety and suitability check on individuals seeking employment 
aboard U.S. merchant vessels greater than 100 Gross Register Tons 
(Domestic Tonnage), except operators of uninspected passenger vessels. 

Program: Private Charter Standard Security Program; 
Description: TSA conducts a Security Threat Assessment on private 
charter flight crewmembers operating aircraft with a maximum 
certificated takeoff weight of 45,500kg (100,309 pounds) or more, or a 
passenger-seating configuration of 61 or more, or whose passengers are 
enplaned from or deplaned into a sterile area. 

Program: SSI/Civil Litigant Program; 
Description: TSA conducts a Security Threat Assessment on individuals 
who seek access to Sensitive Security Information in the course of 
civil litigation. 

Program: Secure Flight; 
Description: TSA conducts uniform prescreening of passenger 
information against federal government watch lists for all domestic 
and international passengers traveling on covered flights into, out 
of, within, or over the United States. 

Program: Master Crew Vetting Program; 
Description: TSA conducts a Security Threat Assessment on flight 
crewmembers entering, departing, or flying over U.S. airspace. 

Program: Transportation Worker Identification Credential; 
Description: TSA conducts a Security Threat Assessment on individuals 
who require unescorted access to secure areas of regulated maritime 
facilities, vessels, and all merchant mariners. 

Program: Twelve - Five Standard Security Program; 
Description: TSA conducts a Security Threat Assessment on flight 
crewmembers operating aircraft with a maximum certificated takeoff 
weight of 12,500 pounds or more. 

Source: GAO analysis of TSA information. 

[End of table]
[End of section] 

Appendix III: TSA TWIC, HME, and Aviation Workers Programs: 
Legislative Background and Purpose: 

Following September 11 2001, legislation was enacted into law that was 
designed to ensure that transportation workers, particularly those who 
transport hazardous materials or require unescorted access to secure 
areas of federally regulated maritime or airport transportation 
facilities are properly vetted to identify whether they pose a 
security threat. In response, TSA established the TWIC, HME, and 
Aviation Workers programs. The following summarizes the legislative 
background and purpose of these three programs. 

Table 4: Legislative Background and Purpose of TSA's TWIC, HME, and 
Aviation Workers Programs: 

Program: TWIC; 
Legislative Background and Purpose: In November 2001, the Aviation and 
Transportation Security Act (ATSA)[A] was enacted, requiring TSA to, 
among other things, work with airport operators to strengthen access 
control points to secured areas and to consider using biometric access 
control systems, or similar technologies, to verify the identity of 
individuals who seek to enter a secure airport area. In response to 
ATSA, TSA established the TWIC Program in December 2001. The Maritime 
Transportation Security Act of 2002 (MTSA)b required the Secretary of 
Homeland Security to prescribe regulations preventing individuals from 
having unescorted access to secure areas of MTSA-regulated facilities 
and vessels unless they possess a biometric transportation security 
card and are authorized to be in such an area. MTSA further tasked the 
Secretary with the responsibility to issue biometric transportation 
security cards to eligible individuals unless the Secretary determines 
that an applicant poses a security risk warranting denial of the card. 
The TWIC Program is designed to implement these biometric maritime 
security card requirements--with TSA responsible for conducting 
Security Threat Assessments and MTSA-regulated port facilities--
including private facilities and public port authorities--responsible 
for verifying that workers have a valid TWIC and a valid business case 
to access their facility. TSA has issued and activated over 1.7 
million TWICs to maritime port workers and denied 1,332 applications 
as of June 2011.c. 

Program: HME; 
Legislative Background and Purpose: The USA PATRIOT Act of 2001[D] 
prohibits states from issuing a motor vehicle license to individuals 
seeking to transport hazardous materials in commerce unless a 
determination has been made by the Secretary of Transportation that 
the individual does not pose a security risk warranting denial of the 
license. TSA developed regulations to implement this requirement,e and 
TSA established the HME Program in order to conduct Security Threat 
Assessments for truckers seeking to obtain, renew, or transfer a HME 
on their state-issued commercial driver's license. The Federal Motor 
Carrier Safety Administration within DOT oversees license issuance 
policy and issued a companion rule indicating that state motor vehicle 
agencies can not issue a HME until the applicant has first met TSA 
vetting standards. State motor vehicle agencies are responsible for 
ensuring that TSA has vetted these applicants before it issues a HME. 
As of June 2011, TSA reported conducting Security Threat Assessments 
on approximately 1.5 million HME applicants, and denying over 15,000 
applications. 

Program: Aviation Workers Program; 
Legislative Background and Purpose: ATSA established TSA within DOT as 
the federal agency responsible for civil aviation security 
responsibilities.[F] Pursuant to ATSA, responsibility for the security 
of civil aviation was transferred from the Federal Aviation 
Administration to TSA, along with the Federal Aviation 
Administration's existing aviation security programs, plans, 
regulations, orders, and directives. Among other things, ATSA directs 
TSA to improve the security of airport perimeters and the access 
controls leading to secured areas, and take measures to reduce the 
security risks posed by airport workers. TSA corresponding regulations 
require that before airport and aircraft operators issue 
identification media to workers seeking unescorted access authority to 
sterile areas or a Security Identification Display Area (SIDA), they 
must undergo a fingerprint-based criminal history record check. TSA 
subsequently issued a Security Directive requiring that airport 
operators may not issue identification media to individuals who work 
in or have access to the Air Operations Area unless they undergo a 
Security Threat Assessment including name based terrorism and 
immigration status checks.[G] TSA reports that approximately 1.2 
million workers currently hold airport badges. 

Source: GAO analysis of DHS information: 

Notes: 

[A] Pub. L. No. 107-71, 115 Stat. 597, 610 (2001). 

[B] Pub. L. No. 107-295, 116 Stat. 2064, 2073-74 (2002). 

[C] The number of denials refers specifically to the number of final 
disqualification letters issued by TSA. Some denial letters could be 
repeat applicants. TSA also has waiver and appeals processes, so the 
number of initial disqualification letters issued is greater--over 
90,000, according to TSA. 

[D] Pub.L. No.107-56, 115 Stat. 272, 396-97 (2001). 

[E] 49 C.F.R. Part 1572. 

[F] TSA was subsequently transferred from DOT to DHS in March 2003. 
See Pub. L. No. 107-296, § 403(2), 116 Stat. 2135, 2178 (2002). 

[G] SD 1542-04-08G. 

[End of table] 

[End of section] 

Appendix IV: Criminal Offenses That May Disqualify Applicants from 
Acquiring a TWIC or HME: 

Listed below are criminal offenses that can prevent TWIC or HME 
applicants from being issued a credential. Pursuant to TSA 
implementing regulations, permanent disqualifying criminal offenses 
are those offenses listed in 49 C.F.R. § 1572.103(a) for which an 
applicant has a felony conviction, or has been found not guilty by 
reason of insanity, in a civilian or military jurisdiction. Interim 
disqualifying criminal offenses are those offenses listed in 49 C.F.R. 
§ 1572.103(b) for which the applicant has either (1) a felony 
conviction, or been found not guilty by reason of insanity, within a 7-
year period preceding the application, or (2) incarcerated for that 
crime within a 5-year period preceding the application. Applicants 
with certain permanent disqualifying criminal offenses and all interim 
disqualifying criminal offenses may request a waiver of their 
disqualification pursuant to 49 C.F.R. § 1515.7. In general, TSA may 
issue such a waiver and grant a TWIC or HME if TSA determines that an 
applicant does not pose a security threat based upon the Security 
Threat Assessment. 

Permanent disqualifying criminal offenses for which no waiver may be 
granted. 

1. Espionage, or conspiracy to commit espionage. 

2. Sedition, or conspiracy to commit sedition. 

3. Treason, or conspiracy to commit treason. 

4. A federal crime of terrorism as defined in 18 U.S.C. 2332b(g), or 
comparable State law, or conspiracy to commit such crime. 

Permanent disqualifying criminal offenses for which a waiver may be 
granted. 

1. A crime involving a transportation security incident. A 
transportation security incident is a security incident resulting in a 
significant loss of life, environmental damage, transportation system 
disruption, or economic disruption in a particular area, as defined in 
46 U.S.C. § 70101. The term 'economic disruption' does not include a 
work stoppage or other employee-related action not related to 
terrorism and resulting from an employer-employee dispute. 

2. Improper transportation of a hazardous material under 49 U.S.C. § 
5124, or a State law that is comparable. 

3. Unlawful possession, use, sale, distribution, manufacture, 
purchase, receipt, transfer, shipping, transporting, import, export, 
storage of, or dealing in an explosive or explosive device. An 
explosive or explosive device includes, but is not limited to, an 
explosive or explosive material as defined in 18 U.S.C. §§ 232(5), 
841(c) through 841(f), and 844(j); and a destructive device, as 
defined in 18 U.S.C. § 921(a)(4) and 26 U.S.C. § 5845(f). 

4. Murder. 

5. Making any threat, or maliciously conveying false information 
knowing the same to be false, concerning the deliverance, placement, 
or detonation of an explosive or other lethal device in or against a 
place of public use, a state or government facility, a public 
transportation system, or an infrastructure facility. 

6. Violations of the Racketeer Influenced and Corrupt Organizations 
Act, 18 U.S.C. § 1961, et seq., or a comparable State law, where one 
of the predicate acts found by a jury or admitted by the defendant, 
consists of one of the crimes listed in paragraph 49 C.F.R. § 1572.103 
(a). 

7. Attempt to commit the crimes in paragraphs listed under 49 C.F.R. § 
1572.103 (a)(1) through (a)(4). 

8. Conspiracy or attempt to commit the crimes in 49 C.F.R. § 1572.103 
(a)(5) through (a)(10). 

Interim disqualifying criminal offenses. 

1. Unlawful possession, use, sale, manufacture, purchase, 
distribution, receipt, transfer, shipping, transporting, delivery, 
import, export of, or dealing in a firearm or other weapon. A firearm 
or other weapon includes, but is not limited to, firearms as defined 
in 18 U.S.C. § 921(a)(3) or 26 U.S.C. § 5845(a), or items contained on 
the United States Munitions Import List at 27 C.F.R. § 447.21. 

2. Extortion. 

3. Dishonesty, fraud, or misrepresentation, including identity fraud 
and money laundering where the money laundering is related to a crime 
described in 49 C.F.R. § 1572.103 (a) or (b). Welfare fraud and 
passing bad checks do not constitute dishonesty, fraud, or 
misrepresentation for purposes of this paragraph. 

4. Bribery. 

5. Smuggling. 

6. Immigration violations. 

7. Distribution of, possession with intent to distribute, or 
importation of a controlled substance. 

8. Arson. 

9. Kidnapping or hostage taking. 

10. Rape or aggravated sexual abuse. 

11. Assault with intent to kill. 

12. Robbery. 

13. Fraudulent entry into a seaport as described in 18 U.S.C. § 1036, 
or a comparable State law. 

14. Violations of the Racketeer Influenced and Corrupt Organizations 
Act, 18 U.S.C. § 1961, et seq., or a comparable State law, other than 
the violations listed in paragraph 49 C.F.R. § 1572.103 (a)(10). 

15. Conspiracy or attempt to commit the interim disqualifying criminal 
offenses. 

[End of section] 

Appendix V: Criminal Offenses That Disqualify Applicants under the 
Aviation Workers Program from Acquiring an Airport-Issued Access Badge: 

Listed below are the disqualifying criminal offenses that, in general, 
prevent individuals under the Aviation Workers Program seeking 
unescorted access to secure areas of an airport from being issued an 
airport access credential. Pursuant to 49 C.F.R. §§1542.209, 1544.229, 
1544.230, and Security Directive 1542-04-08G, an individual has a 
disqualifying criminal offense if the individual has been convicted, 
or found not guilty of by reason of insanity, of any of the crimes 
listed below in any jurisdiction during the 10 years before the date 
of the individual's application for unescorted access authority, or 
while the individual has unescorted access authority. In contrast to 
TWIC and HME, there is no waiver process for any of the disqualifying 
criminal offenses. However, none of the crimes are permanently 
disqualifying--disqualifying criminal offenses are those specified 
offenses for which an individual has been convicted, or found not 
guilty by reason of insanity during the 10 years before the date of 
the individual's application. As such, we refer to them below as 
interim disqualifying criminal offenses for which no waiver may be 
granted. 

Interim disqualifying criminal offenses for which no waiver may be 
granted. 

1. Forgery of certificates, false marking of aircraft, and other 
aircraft registration violation; 49 U.S.C. § 46306. 

2. Interference with air navigation; 49 U.S.C. § 46308. 

3. Improper transportation of a hazardous material; 49 U.S.C. § 46312. 

4. Aircraft piracy; 49 U.S.C. § 46502. 

5. Interference with flight crew members or flight attendants; 49 
U.S.C. § 46504. 

6. Commission of certain crimes aboard aircraft in flight; 49 U.S.C. § 
46506. 

7. Carrying a weapon or explosive aboard aircraft; 49 U.S.C. § 46505. 

8. Conveying false information and threats; 49 U.S.C. § 46507. 

9. Aircraft piracy outside the special aircraft jurisdiction of the 
United States; 49 U.S.C. § 46502(b). 

10. Lighting violations involving transporting controlled substances; 
49 U.S.C. § 46315. 

11. Unlawful entry into an aircraft or airport area that serves air 
carriers or foreign air carriers contrary to established security 
requirements; 49 U.S.C. § 46314. 

12. Destruction of an aircraft or aircraft facility; 18 U.S.C. § 32. 

13. Murder. 

14. Assault with intent to murder. 

15. Espionage. 

16. Sedition. 

17. Kidnapping or hostage taking. 

18. Treason. 

19. Rape or aggravated sexual abuse. 

20. Unlawful possession, use, sale, distribution, or manufacture of an 
explosive or weapon. 

21. Extortion. 

22. Armed or felony unarmed robbery. 

23. Distribution of, or intent to distribute, a controlled substance. 

24. Felony arson. 

25. Felony involving a threat. 

26. Felony involving: 

(i) Willful destruction of property; 

(ii) Importation or manufacture of a controlled substance; 

(iii) Burglary; 

(iv) Theft; 

(v) Dishonesty, fraud, or misrepresentation; 

(vi) Possession or distribution of stolen property; 

(vii) Aggravated assault; 

(viii) Bribery; or: 

(ix) Illegal possession of a controlled substance punishable by a 
maximum term of imprisonment of more than 1 year. 

27. Violence at international airports; 18 U.S.C. § 37. 

28. Conspiracy or attempt to commit any of the criminal acts listed 
above. 

[End of section] 

Appendix VI: Comments from the Department of Homeland Security: 

U.S. Department of Homeland Security: 
Washington, DC 20528: 

November 30, 2011: 

Mr. Stephen M. Lord: 
Director, Homeland Security and Justice Issues: 
U.S. Government Accountability Office: 
441 G Street, NW: 
Washington, DC 20548: 

Re: Draft Report GAO-12-60, "Transportation Security: Actions Needed to
Address Limitations in TSA's Transportation Worker Security Threat 
Assessments and Growing Workload" 

Dear Mr. Lord: 

Thank you for the opportunity to review and comment on this draft 
report. The U.S. Department of Homeland Security (DHS) appreciates the 
U.S. Government Accountability Office's (GAO's) work in planning and 
conducting its review and issuing this report. 

The Transportation Security Administration (TSA) employs risk-based, 
intelligence-driven operations to prevent terrorist attacks and to 
reduce the vulnerability of the Nation's transportation system to 
terrorism. TSA works collaboratively with industry partners to develop 
and implement programs that promote commerce while enhancing security 
and mitigating the risk to our Nation's transportation system. TSA 
also works closely with other federal agencies and maximizes 
participation from state, local, tribal, and private-sector 
stakeholders to develop a common goal of securing all modes of 
transportation, including aviation, maritime, and surface 
transportation. 

As part of its operations, TSA conducts security threat assessments 
(STAs) to determine whether an applicant seeking access to critical 
components of the Nation's transportation system poses or is suspected 
of posing a threat to transportation or national security. An STA may 
differ from mode-to-mode or program-to-program based on statutory, 
policy, or resource requirements at the time of program 
implementation. An STA includes any combination of fingerprint-based
criminal history records check, a lawful presence check, and checks 
for ties to terrorism. 

TSA's vetting responsibilities have grown significantly in recent 
years. TSA has responded with the development and implementation of 
efficient, reliable, and cost-effective terrorist-related screening 
programs. TSA perpetually vets more than 14 million records per day, 
adjudicates more than 12,000 cases per week, and responds to more than 
400 redress requests per week. 

GAO's report focused on three TSA STA programs. Specifically, the: 

1. Aviation Workers Program, which covers individuals—including 
airport facility workers, retail employees, and some airline employees—
who apply for, or are issued, personnel identification media at U.S. 
domestic airports. The current active badged population is 
approximately 2.1 million, with approximately 450,000 new applicants 
per year. 

2. Transportation Worker Identification Credential Program, which 
covers individuals who must access secure areas of maritime 
facilities, ports, and vessels, and merchant mariners. In the last 4 
years, more than 2 million workers have enrolled in the TWIC program. 
TSA has processed 50,000 appeals and waiver requests. 

3. Hazardous Materials Endorsement Program, which covers drivers 
seeking to obtain, renew, or transfer an HME on a state-issued 
commercial driver's license. This endorsement is required to haul any 
material that requires placarding under the U.S. Department of 
Transportation hazardous materials regulations. Since the HME program 
inception in 2005, more than 1.8 million individuals have applied for 
a new or renewed HME STA. 

DHS recognizes that there are criminal records at the state level, 
which TSA does not receive. 

There are two primary reasons for this. First, the states do not 
always upload all their criminal records to the Federal Bureau of 
Investigation (FBI) biometric criminal recordation system.
Second, states do not respond to criminal history record information 
(CHRI) requests for "non-criminal justice purposes,"[Footnote 1] and 
the states and U.S. Department of Justice (DOJ) currently view
TSA's transportation worker vetting programs as "non-criminal justice" 
activities. In addition, because of this designation, TSA is unable to 
request subsequent CHRI for recurrent vetting without a submission of 
new fingerprints and fees from the individual. TSA's level of CHRI 
access is equal to that of a private company doing an employment check 
on a new applicant. 

To provide the most robust vetting against criminal history records so 
that TSA can effectively meet its statutory requirements to mitigate 
risks to the security of the Nation's transportation systems, TSA 
should have full access to CHRI. DHS, in coordination with TSA, will 
continue to work with DOJ, the FBI, and the states to expand access to 
the CHRI. 

The draft report contained three recommendations with which DHS 
concurs and has already initiated steps to implement. Specifically, 
GAO recommended that: 

Recommendation 1: The Secretary of Homeland Security and the Attorney 
General of the United States jointly assess the extent to which a 
security risk may exist with respect to the level of access to 
criminal history records information currently received by TSA to 
complete STAs, identify alternatives to address any risks, and assess 
the costs and benefits of pursuing each alternative. 

Response: Concur. DHS looks forward to working with DO! to assess the 
extent of security risk, identify alternatives to address any risks, 
and evaluate the costs and benefits of each alternative. As you know, 
TSA has been working with DOJ, the FBI, and states for several years 
to obtain more comprehensive access to CHRI. We have explored the 
possibility that DOJ view TSA's transportation worker vetting as 
"criminal justice" purposes[Footnote 2] (to which all 50 states and 
the District of Columbia respond); designate TSA's transportation 
vetting as a "national security" purpose (to which 45 states currently 
respond); or use current statutory and regulatory authority[Footnote 
3] to provide more access to criminal records. 

As of mid-October 2011, TSA and the FBI implemented a pilot program to 
use the FBI Interstate Identification Index (III) to obtain state CHRI 
along with the FBI's CHRI in an automated fashion. TSA currently 
receives automated data from 14 states, and the pilot program will 
provide information from 22 additional states that respond to non-
criminal justice requests through the III. The solution involves 
querying III for additional state-level information if the
FBI CHRI contains any information from the state for a given 
individual. DHS and the FBI have also begun discussions regarding 
another pilot project to address recurrent criminal history inquiries, 
also known as "rapback." The FBI has proposed piloting an interim or 
manual rapback solution with TSA for spring/summer 2012 before its 
automated rapback capability (targeted for 2014-2015) occurs. 

The III check and rapback pilot projects will be implemented for those 
individuals who have criminal records in the FBI database when the STA 
is first conducted. The projects will identify individuals who have a 
previous criminal history with the FBI at the start of the STA process.
Thus, TSA will not receive records for: 1) individuals who have 
criminal history records at the state level only; or 2) individuals 
with no initial criminal records but who commit criminal offenses 
after the STA is approved. 

As the pilots progress, TSA will work with the FBI to identify the 
differences between the standard FBI CHRI non-criminal justice results 
and the additional state data. TSA will work with the FBI to include 
these results in the overall assessment of risks regarding TSA's 
current level of CHRI access. 

Recommendation 2: The Secretary of Homeland Security direct the TSA 
Administrator to conduct an assessment of the risks associated with 
not utilizing some state-provided criminal history information, as 
well as an analysis of the costs and benefits of integrating the 
information into the current adjudication process. 

Response: Concur. Although TSA does not believe it needs to conduct an 
assessment of the risk or cost and benefit analysis, TSA concurs with 
the intent of this recommendation and, as described in Recommendation 
1, has already identified a solution that can be discussed. 

Since 2005, TSA has conducted assessments to identify alternatives to 
integrate state-level data. TSA worked with the states, FBI, and the 
National Crime Prevention and Privacy Compact Council to convene 
working groups to identify possible solutions to receive data directly 
from other states and a standard, automated, more cost-efficient and 
effective solution. TSA later leveraged these efforts in the TWIC 
program and other STA programs that require criminal history records 
checks. TSA discovered multiple problems with obtaining information 
directly from the states: 

1. The states have varying data systems and legal and practical 
constraints, and TSA would likely be required to develop and build a 
unique solution for each state to request data directly from all 
states for each STA case. To minimize these problems,
TSA has discussed with the states an option of defining one common 
technical solution through which states could send their data directly 
to TSA. TSA is pursuing this as part of the Transportation Threat 
Assessment and Credentialing (TTAC) Infrastructure Modernization 
program, which was established to standardize and consolidate TSA's 
security threat assessment systems. 

2. Because many transportation workers have resided in and continually 
travel across multiple states, requesting and receiving state-level 
data from only an applicant's state of residence or enrollment is 
inadequate and may miss criminal history in other states. 

3. Some states may require additional fees to respond to TSA's request 
directly, rather than using the FBI's system. As required by statute, 
TSA's transportation worker vetting programs are funded through user 
fees; this additional cost could dramatically increase fees to the 
workers. 

For the listed reasons, TSA has determined that using the established 
FBI III system to request and receive data from all states would be 
the most effective and efficient solution. State criminal history data 
may be accessed via the III system managed by the FBI. The extent of 
access to state data is based on the purpose of the data request. 
Currently, a request must be deemed a "criminal justice" purpose to 
receive the full breadth of CHRI available from all 50 states and the
District of Columbia. Many states may not upload all available 
information into the FBI biometric system made available to TSA today, 
and many states do not provide their III records for non-criminal 
justice activities. If the pilot with the FBI is successful, this 
method of using the state information may prove to be the most 
efficient and effective means of sharing the most complete CHRI. 

Recommendation 3: The Secretary of Homeland Security direct the TSA 
Administrator to develop a workforce staffing plan with timelines 
articulating how the TTAC Adjudication Center will effectively and 
efficiently meet its current and emerging workload requirements, and 
incorporate the results of TSA's study examining the appropriateness 
and costs and benefits of using contractors. 

Response: Concur. Although TSA does not believe that the TTAC 
Adjudication Center has challenges in meeting its workload 
requirements, we concur with the recommendation and have been working 
on these strategies since before issuance of this draft report. TSA is 
currently meeting its Adjudication Center workload requirements and 
provided GAO a copy of the workforce staffing plan. TSA recognizes the 
importance of appropriately balancing its federal and contractor 
workforce and, in 2010, began a review to ensure that the right 
workforce balance is achieved. TSA is analyzing the results of this 
review to achieve the best balance of federal and contractor resources 
as part of the Department-wide Balanced Workforce Strategy. The 
results will be available once finalized. 

As new STA programs are legislated and defined in regulation, TSA will 
continue to assess the staffing needs to implement each emerging STA 
requirement on the basis of Balanced Workforce Strategy results. 

Again, thank you for the opportunity to review and comment on this 
draft report. Sensitivity comments were previously provided under 
separate cover. We look forward to working with you on future Homeland 
Security issues. 

Sincerely, 

Signed by: 

Jim H. Crumpacker: 
Director: 
Departmental GAO-OIG Liaison Office: 

Appendix VI Footnotes: 

[1] "Non-criminal justice purposes" means uses of criminal history 
records for purposes authorized by federal or state law other than 
purposes relating to criminal justice activities, including employment 
suitability, licensing determinations, immigration and naturalization 
matters, and national security clearances, (42 U.S.C. § 14616). 

[2] "Criminal justice" includes activities relating to the detection, 
apprehension, detention, pretrial release, post-trial release, 
prosecution, adjudication, correctional supervision, or rehabilitation 
of accused persons or criminal offenders. The administration of 
criminal justice includes criminal identification activities and the 
collection, storage, and dissemination of criminal history records. 
(42 U.S.C. § 14616) 

[3] See 28 U.S.C. § 534; 28 CFR § 20.33(a) (2). 

[End of section] 

Appendix VII: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

Stephen M. Lord at (202) 512-4379 or lords@gao.gov: 

Staff Acknowledgments: 

In addition to the contact named above, David Bruno, Assistant 
Director, and Jason Berman, Analyst-in-Charge, managed this 
assignment. David Bieler, James Lawson, and Rebecca Kuhlmann Taylor 
made significant contributions to this report. Michele Fejfar and 
Richard Hung assisted with design and methodology. Geoffrey Hamilton 
provided legal support. Tina Cheng, Jessica Orr, and Robert Robinson 
provided assistance in report preparation. 

[End of section] 

Footnotes: 

[1] Under Coast Guard maritime security regulations, a secure area, in 
general, is an area over which the owner/operator has implemented 
security measures for access control in accordance with a Coast Guard-
approved security plan. For most maritime facilities, the secure area 
is generally any place inside the outer-most access control point. For 
a vessel or outer continental shelf facility, such as off-shore 
petroleum or gas production facilities, the secure area is generally 
the whole vessel or facility. Secured airport areas include those 
portions of an airport, specified in the airport security program, for 
which security measures are conducted and generally include three 
categories. In general (1) a Security Identification Display Area 
(SIDA) is an area in which appropriate identification must be worn, 
(2) a sterile area provides passengers access to boarding aircraft and 
is an area to which access is generally controlled by TSA or a private 
screening entity under TSA oversight, and (3) an Air Operations Area 
is an area providing access to aircraft movements and parking areas. 
See 49 C.F.R. § 1540.5. 

[2] A Security Threat Assessment includes conducting a background 
check to determine whether each applicant is a security risk to the 
United States. These checks, in general, can include checks for 
criminal history records, immigration status, terrorism databases and 
watchlists, and records indicating an adjudication of lack of mental 
capacity, among other things. TSA security threat assessment-related 
regulations define the term security threat to mean an individual whom 
TSA determines or suspects of posing a threat to national security; to 
transportation security; or of terrorism. 

[3] See 49 U.S.C. § 44936; 49 C.F.R. §§ 1542.209, 1544.229 and 
1544.230. 

[4] For example, in accordance with Coast Guard regulation, all 
mariners employed aboard U.S. merchant vessels greater than 100 Gross 
Register Tons (Domestic Tonnage), except operators of uninspected 
passenger vessels, are required to have a valid U.S. Merchant Mariners 
Credential. Under this program, TSA and Coast Guard conduct the 
background check, with Coast Guard responsible for issuing a 
credential. Once the credential is issued, the Coast Guard is 
responsible for verifying the validity of the credential. Nonfederal 
public entities--such as a state or port authority--do not have roles 
in this credentialing process. Port authorities may be state or local 
government entities, but may also be privately operated. 

[5] Pub. L. No. 107-295, 116 Stat. 2064, 2073-74 (2002). 

[6] Biometrics refers to technologies that measure and analyze human 
body characteristics--such as fingerprints, eye retinas and irises, 
voice patterns, facial patterns, and hand measurements--for 
authentication purposes. 

[7] Pub. L. No. 111-281, 124 Stat. 2905, 2999 (2010). 

[8] Pub. L. No.107-56, 115 Stat. 272, 396 (2001). 

[9] Pub. L. No. 107-71, 115 Stat. 597, 639-40 (2001). 

[10] The Screening Coordination Office was established by DHS to 
coordinate the numerous and disparate credentialing and screening 
initiatives within DHS. 

[11] These organizations included the American Association of Port 
Authorities, Owner Operator Independent Drivers Association; American 
Trucking Associations; American Association of Motor Vehicle 
Administrators; American Association of Airport Executives; Institute 
of Makers of Explosives; National Petrochemical & Refiners 
Association; International Liquid Terminals Association; and the 
Agricultural Retailers Association. 

[12] TSA classifies the nation's approximately 450 commercial airports 
into one of five categories (X, I, II, III, and IV) based on various 
factors, such as the number of take-offs and landings annually, the 
extent of passenger screening at the airport, and other security 
considerations. In general, Category X airports have the largest 
number of passenger boardings, and Category IV airports have the 
smallest. 

[13] We obtained information from eight airports, including: 
Hartsfield-Jackson Atlanta International Airport, Los Angeles 
International Airport; Denver International Airport; John F. Kennedy 
International Airport; Seattle-Tacoma International Airport; 
Washington Dulles International Airport; Baltimore/Washington 
International Airport; and Portland International Airport. 

[14] We obtained information from six states: California, Florida, 
Illinois, Maryland, New York, and Texas. 

[15] On September 27, 2011, TSA announced a reorganization that would 
place TTAC into a newly established Office of Intelligence and 
Analysis. According to TSA, the agency is making several enhancements 
to better align headquarters functions to enable its continued 
evolution to a high performance counterterrorism organization. This 
includes merging various TTAC functions with the Office of 
Intelligence to ensure vetting and intelligence informs daily 
operations. 

[16] The Compact Council's mission statement provides that the Compact 
Council, as a national independent authority, works in partnership 
with criminal history record custodians, end users, and policy makers 
to regulate and facilitate the sharing of complete, accurate, and 
timely criminal history record information to noncriminal justice 
users in order to enhance public safety, welfare, and security of 
society while recognizing the importance of individual privacy rights. 

[17] SEARCH is a nonprofit organization created by and for states 
which serves as the national consortium for justice information and 
statistics. It is governed by a Membership Group comprised of one 
gubernatorial appointee from each of the 50 states, the District of 
Columbia, Puerto Rico and the U.S. Virgin Islands, as well as eight at-
large appointees selected by SEARCH's Chair. Members are primarily 
state-level justice officials responsible for operational decisions 
and policymaking concerning the management of criminal justice 
information, particularly criminal history information. 

[18] GAO, Standards for Internal Control in the Federal Government, 
[hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] 
(Washington, D.C.: November 1999). 

[19] In addition, the TWIC and HME disqualifying criminal offenses 
include related conspiracy and attempt offenses for each of the 24 
specified offenses. 

[20] Applicants with certain permanent disqualifying criminal offenses 
and any interim disqualifying criminal offenses may request a waiver 
of their disqualification. In general, TSA may issue such a waiver if 
TSA determines that an applicant does not pose a security threat based 
upon the security threat assessment. There is also an appeals process 
by which any applicant may appeal a TSA finding that the applicant 
poses a security threat. 

[21] Similar to the TWIC and HME disqualifying criminal offenses, the 
aviation disqualifying criminal offenses also include additional 
related conspiracy and attempt offenses for each of the disqualifying 
offenses. 

[22] The mission of TTAC is to reduce the probability of a successful 
terrorist or other criminal attack on the transportation system 
through the application of threat assessment methodologies that are 
intended to identify known or suspected terrorist threats working or 
seeking to access the United States' transportation system. 

[23] The FBI maintains the Integrated Automated Fingerprint 
Identification System, which is a national fingerprint and criminal 
history system that responds to requests from local, state, and 
federal agencies. The system provides automated fingerprint search 
capabilities, latent search capability, electronic image storage, and 
electronic exchange of fingerprints and responses. A segment of this 
system is the FBI-maintained criminal history record repository, known 
as the Interstate Identification Index (III or "Triple I") system that 
contains records from all states and territories, as well as from 
federal and international criminal justice agencies. The state records 
in the III are submitted to the FBI by central criminal record 
repositories that aggregate criminal records submitted by most or all 
of the local criminal justice agencies in their jurisdictions. The 
records in the system are all based on 10 rolled fingerprints, which 
provide a positive, biometric match between the individual and his or 
her record. The NCIC is a name and biographic descriptor-based 
computerized system containing criminal justice information (i.e. 
wanted person information; sex offender information; missing person 
information; unidentified person information; and stolen property 
information). 

[24] Pursuant to Homeland Security Presidential Directive 6, dated 
September 16, 2003, the Terrorist Screening Center--under the 
administration of the FBI--was established to develop and maintain the 
U.S. government's consolidated database of terrorist screening 
information, called the Terrorist Screening Database. Terrorist 
identity information in the Terrorist Screening Database is used for 
security-related screening processes. The Selectee List, a subset of 
the Terrorist Screening Database, contains information on individuals 
who must undergo additional security screening before being permitted 
to board an aircraft. The No Fly List, another subset of the Terrorist 
Screening Database, contains information on individuals who are 
prohibited from boarding an aircraft. The No Fly and Selectee lists 
contain applicable identity information from the Terrorist Screening 
Center's consolidated database of known or suspected terrorists. 

[25] Run by U.S. Citizenship and Immigration Services, the Systematic 
Alien Verification for Entitlements information system is an 
intergovernmental initiative designed to aid benefit-granting agencies 
in determining an applicant's immigration status, thereby ensuring 
that only entitled applicants receive federal, state, or local public 
benefits and licenses. The program is an information service for 
benefit-granting agencies, institutions, licensing bureaus, and other 
governmental agencies. 

[26] Each state maintains a central criminal repository, or database, 
of criminal arrests and convictions of individuals in that state. 

[27] Individuals with unescorted access to an airports Sterile Area 
and SIDA are required to undergo immigration and terrorist vetting as 
well as a criminal history record check. Those requiring Air 
Operations Area access undergo a terrorist and immigration check, but 
not a criminal history record check. 

[28] Based on information we obtained between April and November 2011. 

[29] In May 2011, the State of Florida amended Florida State Law 
311.12 repealing provisions requiring workers accessing the state's 12 
active deepwater public ports to undergo a state criminal history 
records check. The repealed provisions contained disqualifying 
offenses, such as theft and burglary, not specifically identified as a 
disqualifying offense under the TWIC program. The repealed provisions 
also required that individuals who had obtained their TWIC through the 
federal TWIC-waiver process, whereby individuals with disqualifying 
offenses could be granted a TWIC, had to additionally seek a Florida 
waiver. While Florida has repealed its background check requirements, 
various Florida ports still require that individuals attempting to 
gain access to a port or facility provide a local port-specific 
identification card in addition to the TWIC. 

[30] Each state maintains a repository, which is a central database 
that maintains criminal history records on all state offenders. 
Records include fingerprint files and files containing identification 
segments and notations of arrests and dispositions. The central 
repository is generally responsible for state-level identification of 
arrestees, and commonly serves as the central control terminal for 
contact with FBI record systems. 

[31] A machine readable identification card can be read with or 
without direct contact (proximity) of the card with an electronic 
reader. Techniques for storing and reading the cards include smart 
chips which are integrated circuits imbedded in the card which allow 
data to be stored on the card, bar codes, and magnetic strips. 

[32] To date, Coast Guard has not issued its final TWIC card reader 
rule. The Coast Guard is responsible for developing TWIC-related 
security regulations and ensuring that MTSA-regulated maritime 
facilities and vessels are in compliance with these regulations. In 
August 2006, DHS officials decided, based on industry comment, to 
implement TWIC through two separate regulations, or rules. The first 
rule, issued in January 2007, directs the use of the TWIC as an 
identification credential or flashpass. The second rule, the card 
reader rule, is currently under development and is expected to address 
how the access control technologies, such as biometric card readers, 
are to be used for confirming the identity of the TWIC holder against 
the biometric information on the TWIC. On March 27, 2009, the Coast 
Guard issued an Advance Notice of Proposed Rule Making for the card 
reader rule. 

[33] TSA maintains a database identifying whether a TWIC is valid or 
has been canceled. TSA provides MTSA regulated port facility operators 
with periodic updates of this information. 

[34] The method by which facility operators may meet this requirement 
is left to the operator themselves, such as by questioning TWIC 
holders to determine whether they have a bonafide business need. 

[35] GAO, Transportation Worker Identification Credential, Internal 
Control Weaknesses Need to Be Corrected to Help Achieve Security 
Objectives. [hyperlink, http://www.gao.gov/products/GAO-11-657] 
(Washington, D.C.: May 10, 2011). 

[36] Under TSA's Security Threat Assessment process, applicants who 
are determined to have disqualifying criminal offenses may request a 
waiver for certain disqualifying offenses, including murder and 
robbery. Appendix IV lists these offenses. MTSA required the 
establishment of a waiver process, and under TSA implementing 
regulations, TSA may issue a waiver if TSA determines that an 
applicant does not pose a security threat after considering, as 
applicable, the circumstances of the disqualifying act or offense, 
restitution made by the applicant, and federal or state mitigation 
remedies, court records, or official medical release documents 
indicating that the applicant no longer lacks mental capacity, or 
other factors that indicate the applicant does not pose a security 
threat warranting denial. 

[37] TSA reported all were valid TWIC holders as of July 1, 2011. 

[38] Concern over the impact of illicit drugs and drug trafficking 
came to the forefront in Florida during the mid to late 1990s. 
According to a 1998 Florida State Senate report, Florida ports had 
extensive criminal networks conducting narcotics and cargo theft. 
According to this report, in 1997 there were more cocaine-related 
deaths in Florida than murders. Additionally, the FBI estimates that 
in the United States, cargo theft amounts to $12 billion annually and 
finds that most cargo theft occurs in or near seaports. 

[39] According to Port of Miami officials, many of the 52 TWIC holders 
were denied because they had disqualifying criminal offenses based on 
the former state port security law, including for multiple theft 
violations. 

[40] A rap back refers to an automated system identifying arrests, 
wants, or warrant information of an individual after compiled criminal 
history information has been released to a requesting agency. 

[41] TSA requires TWIC applicants pay a fee of $132.50 pursuant to 6 
U.S.C. § 469, which requires TSA to charge reasonable fees for 
credentialing and background investigations in the field of 
transportation. 

[42] The Alabama State Port Authority reported costs including an NCIC 
subscription for conducting name based criminal history checks and 
classroom supplies for required security awareness training required 
for applicants. 

[43] TSA established the Infrastructure Modernization program to 
standardize and consolidate the agency's Security Threat Assessment 
systems. We are currently conducting a separate review of this program 
and anticipate reporting by the end of calendar year 2011. 

[44] Of the six states that we contacted, the four that conducted 
state criminal history record checks were Florida, Maryland, New York, 
and Texas. Two others contacted--California and Illinois--reported not 
implementing additional activities. 

[45] Two of these four states--New York and Maryland--are required by 
state statute to conduct state criminal history checks on applicants 
before issuing a HME. The two others--Texas and Florida--both reported 
they were doing so on a voluntary basis. 

[46] According to responsible officials with New York state's program, 
New York state's lawmakers established their program to address the 
unique security threats facing New York. 

[47] If TSA determines that an individual poses a threat based on 
checks of information in the Terrorist Screening Database or 
immigration checks, TSA will notify the airport to revoke the 
credential. 

[48] TWICs, in general, are to expire 5 years after the date of 
issuance at the end of the calendar day. With respect to HMEs, each 
state must require that hazardous material endorsements be renewed 
every 5 years or less so that individuals are subject to a TSA 
security screening requirement at least every 5 years. 

[49] The Interstate Identification Index system uses an index-pointer 
approach to tie together the criminal history record databases of 
state central repositories and the FBI. Under this system, the FBI 
makes available an index listing the names of individuals on whom it 
maintains criminal history record information. An agency seeking 
criminal history record information on a specific individual will 
submit that individual's name and fingerprints to the FBI. The Bureau 
will match the name and fingerprints against the index and then 
"point" the information request to the database (either State or 
Federal) where the requested information is maintained. The index 
contains information on persons arrested for fingerprintable felonies 
and misdemeanors under state or federal law. It includes 
identification information (for example, name, birth date, race and 
gender), and FBI and state identification numbers from each state that 
has information about an individual. FBI reports the Integrated 
Automated Fingerprint Identification System, which includes the 
Interstate Identification Index, held the criminal histories of more 
than 70 million subjects. 

[50] Pub. L. No. 105-251, 112 Stat. 1870, 1874 (1998). According to 
Compact Council documents, the Compact became effective April 28, 
1999, after Montana and Georgia became the first two states to ratify 
it, respectively. To date, 29 states have ratified the Compact. 

[51] The National Crime Prevention and Privacy Compact provides for 
the creation of a Compact Council to oversee noncriminal justice use 
of the Interstate Identification Index. The Compact Council's mission 
statement provides that the Council, as a national independent 
authority, works in partnership with criminal history record 
custodians, end users, and policy makers to regulate and facilitate 
the sharing of complete, accurate, and timely criminal history record 
information to noncriminal justice users in order to enhance public 
safety, welfare, and security of society while recognizing the 
importance of individual privacy rights. Under the Compact Act, the 15 
members of the Compact Council appointed by the Attorney General are 
to be comprised of nine State Compact Officers, two at-large members 
nominated by the FBI Director, two at-large members nominated by the 
Chairman of the Compact Council, one FBI Advisory Policy Board 
representative, and one FBI representative. 

[52] In addition, the Compact Act defines the term "criminal justice 
agency" to mean, (1) courts, and (2) a governmental agency or subunit 
thereof that (i) performs the administration of criminal justice 
pursuant to a statute or executive order, and (ii) allocates a 
substantial part of its annual budget to the administration of 
criminal justice. The term criminal justice agency also includes 
federal and state inspectors general offices. 

[53] All 50 states and the District of Columbia participate in the 
Interstate Identification Index. Fifteen states also participate in 
the National Fingerprint File. National Fingerprint File states assume 
responsibility for providing Interstate Identification Index-indexed 
records for criminal and noncriminal requests--a responsibility 
traditionally maintained by the FBI. Since states traditionally report 
to have more complete information than what has been submitted to the 
FBI's systems, the National Fingerprint File allows participating 
states to provide their state rap sheets directly when the FBI 
processes fingerprint-based criminal history record checks. The FBI 
reports that, as of October 9, 2011, the 15 National Fingerprint File 
states were Colorado, Florida, Georgia, Hawaii, Idaho, Kansas, 
Maryland, Minnesota, Montana, North Carolina, New Jersey, Oklahoma, 
Oregon, Tennessee, and Wyoming. 

[54] According to TSA, the agency has conducted over 3 million 
Security Threat Assessments requiring a criminal history record check, 
and over 40 percent of the cases have included associated criminal 
records identified during automated FBI database checks, thus 
requiring an initial manual review by adjudicators at the TTAC 
Adjudication Center. 

[55] U.S. Department of Justice, Office of the Attorney General, The 
Attorney General's Report on Criminal History Background Checks (June 
2006). 

[56] According to a TSA estimate from November 2010, of the 3 million 
Security Threat Assessments requiring a criminal history record check, 
over 40 percent of the cases had associated criminal records that TSA 
manually adjudicated for possible disqualifying offenses. Of these, 
TSA's TTAC issued 62,000 initial threat determinations for applicants 
identified with potentially disqualifying offenses. Of these, roughly 
23,560 (38 percent) had open dispositions and TSA reported that many 
of these may have been resolved through expanded criminal justice 
information access to FBI's Interstate Identification Index. 

[57] The FBI reported that, to address the issue, the Bureau had 
historically taken a proactive approach to encourage and assist 
agencies to submit complete and accurate information in a timely 
manner. Among these efforts have included providing operational and 
policy guidance to agencies requesting assistance with submitting 
criminal history record information, hosting annual national criminal 
history improvement conferences, technical support to agencies 
transitioning from manual processing to automated electronic 
submissions. 

[58] Compact Act implementing regulations provide that for purposes 
approved by the Compact Council, a delayed submission of fingerprints 
may be permissible under exigent circumstances. 

[59] The Departments of Commerce, Justice, and State, and Related 
Agencies Appropriations Act, 1991, in general, authorizes FBI to 
establish and collect fees to process fingerprint identification 
records and name checks for non-criminal justice purposes, and the 
current FBI fee is $17.25 per check (Pub. L. No. 101-515, 104 Stat. 
2101, 2112 (1990)(codified at 28 U.S.C. §534 note)). 

[60] [hyperlink, http://www.gao.gov/products/GAO-11-657]. 

[61] TSA reported that it conducts a name-based check of enrollees 
against federal wants and warrants on an ongoing basis for TSA 
credentialing programs which require a criminal history record check. 
However, these checks are against federal wants and warrants lists, 
not state-level information. Federal wants generally consist of 
information on wanted persons, or individuals, for whom federal 
warrants are outstanding. 

[62] According to TSA, it is not by definition a criminal justice 
agency, but is uniquely different in scope and nature of mission. 
Security Threat Assessments, according to TSA, are not uniquely 
noncriminal justice in nature, as they are not employment specific, 
but the goal of conducting them is to prevent, deter, and protect 
critical infrastructure and transportation networks against terrorist 
attacks. 

[63] The FBI reports that this solution would provide TSA with 
additional information to support TSA adjudication determinations, 
including information on the offense level type and the specific state 
statute of the offense. 

[64] GAO, Standards for Internal Control in the Federal Government, 
[hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] 
(Washington, D.C.: November 1999). 

[65] Officials with the Florida Department of Law Enforcement reported 
using a 2005 DHS grant to fund a technical solution for transmitting 
its information to TSA. Officials reported doing so to improve the 
information available for TSA's Security Threat Assessment. 

[66] If TSA determines an applicant has one or more disqualifying 
criteria, the agency issues an Initial Determination of Threat 
Assessment letter to the applicant. Redress is adjudication of cases 
for those applicants seeking a waiver or appeal to the Initial 
Determination of Threat Assessment. 

[67] The Adjudication Center caseload is completed using contractor 
staff to perform initial adjudication with federal staff reviewing all 
potentially disqualifying cases, issuing Initial Determination of 
Threat Assessments, and conducting redress actions supported by more 
senior contractor staff. 

[68] TSA reported that upon the completion of each existing contract 
period of performance, the government was required to resolicit for a 
new contractor. 

[69] According to TSA data, a total of 937,933 applicants enrolled in 
TSA's HME, TWIC, and Aviation Workers programs from July 2010 through 
June 2011. During automated vetting, 396,514 applicants were 
identified as having some derogatory information requiring 
adjudication center review during this period. 

[70] GAO, A model of Strategic Human Capital Management, [hyperlink, 
http://www.gao.gov/products/GAO-02-373SP] (Washington, D.C.: Mar. 15, 
2002). 

[71] Inherently governmental functions are generally defined as those 
functions that are so intimately related to the public interest as to 
require performance by federal government employees. 

[72] According to the contract, for the first year, contractor fees 
are $5,954,821--of which $4,463,918 is for labor. 

[73] According to TSA's contract for the Adjudication Center, taking 
on new programs may increase the caseload of the adjudication center--
including doubling or tripling the caseload for some durations. 

[74] GAO, Human Capital: Key Principles for Effective Strategic 
Workforce Planning [hyperlink, http://www.gao.gov/products/GAO-04-39] 
(Washington, D.C.: Dec. 11, 2003). 

[75] Pub.L. No.107-56, 115 Stat. 272 (2001). 

[76] Pub. L. No. 107-71, 115 Stat. 597 (2001). 

[77] Pub. L. No. 107-295, 116 Stat. 2064 (2002). 

[78] Other organizations we contacted included the Owner Operator 
Independent Drivers Association ; American Association of Motor 
Vehicle Administrators; American Association of Airport Executives; 
Institute of Makers of Explosives; National Petrochemical & Refiners 
Association; International Liquid Terminals Association; and 
Agricultural Retailers Association. 

[79] The top 10 ports by container volume in 2010 were: Los Angeles, 
Calif.; Long Beach, Calif.; New York, N.Y.; Savannah, Ga.; Oakland, 
Calif.; Norfolk, Va.; Houston, Tex.; Seattle, Wash.; Charleston, S.C.; 
and Tacoma, Wash. The additional seven ports we contacted include: 
Miami, Fla.; Port Everglades, Fla.; Baltimore, Md.; Wilmington, N.C.; 
Portland, Oreg.; Boston, Mass.; and Mobile, Ala. 

[80] TSA classifies the nation's approximately 450 commercial airports 
into one of five categories (X, I, II, III, and IV) based on various 
factors, such as the number of take-offs and landings annually, the 
extent of passenger screening at the airport, and other security 
considerations. In general, Category X airports have the largest 
number of passenger boardings, and Category IV airports have the 
smallest. 

[81] We obtained information from eight airports: Atlanta, Los 
Angeles; Denver; New York-JFK; Seattle-Tacoma International Airport; 
Washington-Dulles International Airport; Baltimore/Washington 
International; and Portland, Oregon. 

[82] We obtained information from six states: California, Texas, 
Florida, New York, Illinois, Maryland. 

[83] According to Department of Transportation officials, information 
on the number of HME endorsements by state was not available. 
Therefore, we used data provided by the department on the number of 
Master Pointer Records in the Commercial Driver's License Information 
System as a proxy for HME endorsements by state. The system is a 
database that contains certain information on individuals who have 
either been issued a commercial driver's license or who have been 
convicted of an offense in a vehicle that requires a commercial 
driver's license. 

[84] Pub. L. No. 105-251, 112 Stat. 1870, 1876 (1998) (codified at 42 
U.S.C. 14616). 

[85] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] 
(Washington, D.C.: November 1999). 

[86] The Compact Council, as a national independent authority, works 
in partnership with criminal history record custodians, end users, and 
policy makers to regulate and facilitate the sharing of complete, 
accurate, and timely criminal history record information to 
noncriminal justice users in order to enhance public safety, welfare, 
and security of society while recognizing the importance of individual 
privacy rights. 

[87] SEARCH is a nonprofit organization created by and for states 
which serves as the national consortium for justice information and 
statistics. It is governed by a Membership Group comprised of one 
gubernatorial appointee from each of the 50 states, the District of 
Columbia, Puerto Rico and the U.S. Virgin Islands, as well as eight at-
large appointees selected by SEARCH's Chair. Members are primarily 
state-level justice officials responsible for operational decisions 
and policymaking concerning the management of criminal justice 
information, particularly criminal history information. 

[End of section] 

GAO’s Mission: 

The Government Accountability Office, the audit, evaluation, and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the 
performance and accountability of the federal government for the 
American people. GAO examines the use of public funds; evaluates 
federal programs and policies; and provides analyses, recommendations, 
and other assistance to help Congress make informed oversight, policy, 
and funding decisions. GAO’s commitment to good government is 
reflected in its core values of accountability, integrity, and 
reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO’s website [hyperlink, http://www.gao.gov]. Each 
weekday afternoon, GAO posts on its website newly released reports, 
testimony, and correspondence. To have GAO e mail you a list of newly 
posted products, go to [hyperlink, http://www.gao.gov] and select “E-
mail Updates.” 

Order by Phone: 

The price of each GAO publication reflects GAO’s actual cost of 
production and distribution and depends on the number of pages in the 
publication and whether the publication is printed in color or black 
and white. Pricing and ordering information is posted on GAO’s 
website, [hyperlink, http://www.gao.gov/ordering.htm]. 

Place orders by calling (202) 512-6000, toll free (866) 801-7077, or 
TDD (202) 512-2537. 

Orders may be paid for using American Express, Discover Card, 
MasterCard, Visa, check, or money order. Call for additional 
information. 

Connect with GAO: 

Connect with GAO on facebook, flickr, twitter, and YouTube.
Subscribe to our RSS Feeds or E mail Updates. Listen to our Podcasts.
Visit GAO on the web at [hyperlink, http://www.gao.gov]. 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 
Website: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]; 
E-mail: fraudnet@gao.gov; 
Automated answering system: (800) 424-5454 or (202) 512-7470. 

Congressional Relations: 

Ralph Dawn, Managing Director, dawnr@gao.gov, (202) 512-4400
U.S. Government Accountability Office, 441 G Street NW, Room 7125
Washington, DC 20548. 

Public Affairs: 
Chuck Young, Managing Director, youngc1@gao.gov, (202) 512-4800
U.S. Government Accountability Office, 441 G Street NW, Room 7149 
Washington, DC 20548.